Malware Analysis Report

2024-09-11 04:22

Sample ID 240622-mhydasxhpn
Target https://kmspico.io/
Tags
discovery execution exploit persistence spyware stealer upx
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

Threat Level: Likely malicious

The file https://kmspico.io/ was found to be: Likely malicious.

Malicious Activity Summary

discovery execution exploit persistence spyware stealer upx

Downloads MZ/PE file

Creates new service(s)

Possible privilege escalation attempt

Event Triggered Execution: Image File Execution Options Injection

UPX packed file

Reads user/profile data of web browsers

Executes dropped EXE

Modifies file permissions

Loads dropped DLL

Legitimate hosting services abused for malware hosting/C2

Checks installed software on the system

Drops file in System32 directory

Suspicious use of NtSetInformationThreadHideFromDebugger

Launches sc.exe

Drops file in Program Files directory

Drops file in Windows directory

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Scheduled Task/Job: Scheduled Task

Checks processor information in registry

Modifies Internet Explorer Phishing Filter

Modifies registry class

NTFS ADS

Suspicious behavior: GetForegroundWindowSpam

Modifies data under HKEY_USERS

Suspicious use of SendNotifyMessage

Enumerates system info in registry

Modifies Control Panel

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Suspicious use of SetWindowsHookEx

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-22 10:28

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-22 10:28

Reported

2024-06-22 10:29

Platform

win10v2004-20240508-en

Max time kernel

26s

Max time network

27s

Command Line

"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://kmspico.io/

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133635257328294517" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1036 wrote to memory of 3936 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 3936 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2724 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2612 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 2612 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1036 wrote to memory of 4660 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://kmspico.io/

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ad38ab58,0x7ff8ad38ab68,0x7ff8ad38ab78

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=376 --field-trial-handle=1924,i,15079435009388172554,3743164502262111911,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1924,i,15079435009388172554,3743164502262111911,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1924,i,15079435009388172554,3743164502262111911,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3012 --field-trial-handle=1924,i,15079435009388172554,3743164502262111911,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3016 --field-trial-handle=1924,i,15079435009388172554,3743164502262111911,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4368 --field-trial-handle=1924,i,15079435009388172554,3743164502262111911,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 --field-trial-handle=1924,i,15079435009388172554,3743164502262111911,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4808 --field-trial-handle=1924,i,15079435009388172554,3743164502262111911,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3196 --field-trial-handle=1924,i,15079435009388172554,3743164502262111911,131072 /prefetch:1

Network

Country Destination Domain Proto
US 8.8.8.8:53 kmspico.io udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 google.com udp
US 8.8.8.8:53 google.com udp
US 8.8.4.4:53 google.com udp
US 8.8.8.8:53 kmspico.io udp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

\??\pipe\crashpad_1036_NKKOHDMKQKKAEWZH

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 0243da4053619253be0e1cdca256fef8
SHA1 8c91ccee712ba2f13cfaf9d510db6572f0ad1f90
SHA256 157b901896202ae96a6e739f79fb30baf67ef258de4928e2494fa29a0bd532b1
SHA512 88c6bae8e7aa316c3419f784d08b4d87b50a54bacb3e9a8c2efb8e2bbc57fa9c8aa8ca15d400147ec986a62be66d2fe05fb9f0742cdeea7e5f00fa85ead6931e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 047f20dcee1738341c3f896b50622df1
SHA1 72832a8d4a783fb9d553c27b2a08df367da3325c
SHA256 7c10f4c37119ccd5ba05fcdd430c9b753a2bd8fcfbf6f08ea319fba95b0a37c4
SHA512 f968b1af27e899ce8f26536e69ef1cd12f48e8a6c035d4d3837f4f8cef4734b7ede8c0e1c3f1f3252a112fa7ab61279ee06f64f68d74c359598425662431fe51

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 83fa74358b672af172c191e99e75ae1a
SHA1 621127ed1328094271e0e579eb51e22d49600f5b
SHA256 9ef7b98fe9a36d9a865158cf71e401a5113e7a5c57bf1e19d5421e204d0d3182
SHA512 092397b77182f14e6cdd5bb78263da60853d5693a907108cdfea41754b1bc40bfcd1ec687bb329db82562011d6e717c8054757c3aea5b19a14334ed5d00d1d4f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 1aa1d38af113cbd5bdb935ad4f9b44b6
SHA1 2f698ef1deb7d5cb18f12efed240572c0d4dc1fa
SHA256 41dc55c686a1d919a5d5d432c07c0bf3e929cbb345c6ba254f03815f1dfae4d8
SHA512 830db7dcc261450eff4e415d5206006ae5386656bf142aeab9fd93e39ef493be7df84e198c2e716372ea88dcf2a3beb0f3dab21159df6cf8a65ea2ab06e29493

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 3dcd18e98b00dc64ab0ec5346d39dc1f
SHA1 0b70ee11d8086d5f00c8ac03597fa953f91b7d4e
SHA256 954ec619e10ca37cdb7a7766c3b0ddcdd49252fa9b13db387319b521c2a4443c
SHA512 339644a0440df8c067b3bc1e6fd8ccfc8a5598e0aebd052945d7be2db0431bee27166fd872e32907d209b82c141977d146d3b8b95f44381c795c10bfdb11daa2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-22 10:28

Reported

2024-06-22 10:37

Platform

win11-20240508-en

Max time kernel

524s

Max time network

512s

Command Line

"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://kmspico.io/

Signatures

Creates new service(s)

persistence execution

Downloads MZ/PE file

Event Triggered Execution: Image File Execution Options Injection

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" C:\Program Files\KMSpico\KMSELDI.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe C:\Program Files\KMSpico\KMSELDI.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe C:\Program Files\KMSpico\KMSELDI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" C:\Program Files\KMSpico\AutoPico.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" C:\Program Files\KMSpico\KMSELDI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe C:\Program Files\KMSpico\KMSELDI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" C:\Program Files\KMSpico\KMSELDI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe C:\Program Files\KMSpico\KMSELDI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe C:\Program Files\KMSpico\AutoPico.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe C:\Program Files\KMSpico\KMSELDI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe\Debugger = "C:\\Windows\\SECOH-QAD.exe" C:\Program Files\KMSpico\KMSELDI.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe C:\Program Files\KMSpico\AutoPico.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SppExtComObj.exe C:\Program Files\KMSpico\KMSELDI.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\7-Zip\7zFM.exe N/A
N/A N/A C:\Windows\system32\SppExtComObj.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A href.li N/A N/A
N/A href.li N/A N/A
N/A href.li N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\system32\Vestris.ResourceLib.dll C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Windows\system32\is-S2HH9.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Windows\system32\is-V9MTA.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Windows\System32\spp\store\2.0\data.dat C:\Program Files\KMSpico\KMSELDI.exe N/A
File opened for modification C:\Windows\System32\spp\store\2.0\data.dat C:\Program Files\KMSpico\KMSELDI.exe N/A
File created C:\Windows\System32\spp\store\2.0\tokens.dat C:\Program Files\KMSpico\KMSELDI.exe N/A
File created C:\Windows\System32\spp\store\2.0\cache\cache.dat C:\Program Files\KMSpico\KMSELDI.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\Desktop\КМSpicо\KMSpico.exe N/A
N/A N/A C:\Users\Admin\Desktop\КМSpicо\KMSpico.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\KMSpico\cert\kmscert2010\SmallBusBasics\is-EDK62.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW10\Education\is-1N7ND.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW8\ProfessionalN\is-4HMAU.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\icons\is-AAPST.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscert2013\VisioStd\is-I0EEG.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW6\Business\is-K8AF0.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW6\BusinessN\is-P872H.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\icons\is-2KGAU.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File opened for modification C:\Program Files (x86)\7-Zip\Lang\en.ttt C:\Users\Admin\Downloads\7z2407.exe N/A
File opened for modification C:\Program Files (x86)\7-Zip\Lang\ext.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files (x86)\7-Zip\Lang\lij.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\is-Q4A04.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File opened for modification C:\Program Files (x86)\7-Zip\Lang\ku-ckb.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\cert\kmscert2013\Publisher\is-0Q80T.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files (x86)\7-Zip\Lang\lt.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File opened for modification C:\Program Files (x86)\7-Zip\Lang\sr-spc.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\is-PD5UV.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW7\Embedded\is-AA1MI.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW81\Professional\is-OF4HU.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files (x86)\7-Zip\Lang\ast.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\is-093M2.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscert2016\Excel\is-7K083.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW6\Business\is-9FLRB.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW81\is-IOH00.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files (x86)\7-Zip\Lang\th.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\cert\kmscert2013\is-89FJR.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscert2016\ProjectPro\is-MEI2C.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW81\ServerDatacenter\is-HFVF6.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File opened for modification C:\Program Files (x86)\7-Zip\Lang\hy.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files (x86)\7-Zip\Lang\ku.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files (x86)\7-Zip\Lang\sa.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\is-442DS.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW81\Professional\is-0PKTU.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File opened for modification C:\Program Files (x86)\7-Zip\readme.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\cert\kmscert2010\Publisher\is-0C6B9.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscert2013\ProjectPro\is-TD8ES.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW8\ProfessionalWMC\is-I61DS.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscert2010\ProjectPro\is-T6VHL.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscert2013\PowerPoint\is-VKTU3.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files (x86)\7-Zip\Lang\zh-tw.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\sounds\is-I11B0.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW8\CoreSingleLanguage\is-KLV6C.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\scripts\is-LS18D.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscert2010\Word\is-V2JKL.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW10\EnterpriseS\is-G5505.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW10\EnterpriseS\is-S365K.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW6\Enterprise\is-OHAQP.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files (x86)\7-Zip\Lang\hy.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\cert\kmscert2016\VisioStd\is-P90IA.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW81\ProfessionalWMC\is-P3SR8.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\sounds\is-87LFC.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files (x86)\7-Zip\Lang\de.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\cert\kmscert2010\PowerPoint\is-GN6F4.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscert2016\is-7BNMO.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscert2016\Publisher\is-FQCGH.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File opened for modification C:\Program Files (x86)\7-Zip\Lang\hr.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\cert\kmscert2010\OneNote\is-SI617.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\driver\is-VKU30.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\scripts\is-ALDQ0.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW6\is-3K6H6.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File created C:\Program Files\KMSpico\cert\kmscertW7\Professional\is-E9063.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
File opened for modification C:\Program Files (x86)\7-Zip\Lang\kk.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files (x86)\7-Zip\Lang\sl.txt C:\Users\Admin\Downloads\7z2407.exe N/A
File created C:\Program Files\KMSpico\cert\kmscert2010\Excel\is-B5I0D.tmp C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\SECOH-QAD.dll C:\Program Files\KMSpico\KMSELDI.exe N/A
File created C:\Windows\SECOH-QAD.exe C:\Program Files\KMSpico\KMSELDI.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\sc.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\Desktop\КМSpicо\KMSpico.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\Desktop\КМSpicо\KMSpico.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies Control Panel

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Control Panel\Desktop\PaintDesktopVersion = "0" C:\Program Files\KMSpico\KMSELDI.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Control Panel\Desktop\PaintDesktopVersion = "0" C:\Program Files\KMSpico\AutoPico.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Control Panel\Desktop\PaintDesktopVersion = "0" C:\Program Files\KMSpico\KMSELDI.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Control Panel\Desktop\PaintDesktopVersion = "0" C:\Program Files\KMSpico\KMSELDI.exe N/A

Modifies Internet Explorer Phishing Filter

Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\EnabledV9 = "0" C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT C:\Windows\system32\SppExtComObj.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588\DiscoveredKeyManagementServiceIpAddress C:\Program Files\KMSpico\KMSELDI.exe N/A
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133635257330124942" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f C:\Windows\system32\SppExtComObj.exe N/A
Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588 C:\Windows\system32\SppExtComObj.exe N/A
Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion C:\Windows\system32\SppExtComObj.exe N/A
Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform C:\Windows\system32\SppExtComObj.exe N/A
Key created \REGISTRY\USER\S-1-5-20\SOFTWARE C:\Windows\system32\SppExtComObj.exe N/A
Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft C:\Windows\system32\SppExtComObj.exe N/A
Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588 C:\Windows\system32\SppExtComObj.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588\DiscoveredKeyManagementServiceIpAddress = "10.165.204.224" C:\Windows\system32\SppExtComObj.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f\2de67392-b7a7-462a-b1ca-108dd189f588\DiscoveredKeyManagementServiceIpAddress C:\Program Files\KMSpico\KMSELDI.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell C:\Windows\system32\OpenWith.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff C:\Windows\system32\OpenWith.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0 = 5000310000000000a858e8691000372d5a6970003c0009000400efbea858e869d6589c532e000000749f020000000800000000000000000000000000000043c7ee0037002d005a0069007000000014000000 C:\Windows\system32\OpenWith.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\MRUListEx = ffffffff C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell C:\Windows\system32\OpenWith.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" C:\Windows\system32\OpenWith.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" C:\Windows\system32\OpenWith.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 C:\Windows\system32\OpenWith.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Applications C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 C:\Users\Admin\Downloads\7z2407.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" C:\Users\Admin\Downloads\7z2407.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} C:\Windows\system32\OpenWith.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 C:\Windows\system32\OpenWith.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0 C:\Windows\system32\OpenWith.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} C:\Users\Admin\Downloads\7z2407.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip C:\Users\Admin\Downloads\7z2407.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" C:\Users\Admin\Downloads\7z2407.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0 C:\Windows\system32\OpenWith.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" C:\Windows\system32\OpenWith.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Applications\7z.exe\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7z.exe\" \"%1\"" C:\Windows\system32\OpenWith.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" C:\Users\Admin\Downloads\7z2407.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\0\NodeSlot = "4" C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Applications\7z.exe C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Applications\7z.exe\shell C:\Windows\system32\OpenWith.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = 00000000ffffffff C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Applications\7z.exe\shell\open\command C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip C:\Users\Admin\Downloads\7z2407.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0\NodeSlot = "3" C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg C:\Windows\system32\OpenWith.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" C:\Users\Admin\Downloads\7z2407.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" C:\Users\Admin\Downloads\7z2407.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\MuiCache C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip C:\Users\Admin\Downloads\7z2407.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\0 = 8c00310000000000a858066e110050524f4752417e310000740009000400efbec5525961d65898532e0000003f0000000000010000000000000000004a0000000000284ec700500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" C:\Windows\system32\OpenWith.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip C:\Users\Admin\Downloads\7z2407.exe N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\Downloads\fr33__setup_kp.zip:Zone.Identifier C:\Program Files\Google\Chrome\Application\chrome.exe N/A
File opened for modification C:\Users\Admin\Downloads\winrar-x64-701.exe:Zone.Identifier C:\Program Files\Google\Chrome\Application\chrome.exe N/A
File opened for modification C:\Users\Admin\Downloads\7z2407-arm64.exe:Zone.Identifier C:\Program Files\Google\Chrome\Application\chrome.exe N/A
File opened for modification C:\Users\Admin\Downloads\7z2407.exe:Zone.Identifier C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Program Files (x86)\7-Zip\7zFM.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\KMSpico\KMSELDI.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files (x86)\7-Zip\7zFM.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3556 wrote to memory of 2704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 2704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 788 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 3864 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 3864 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3556 wrote to memory of 1608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://kmspico.io/

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdb43fab58,0x7ffdb43fab68,0x7ffdb43fab78

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2132 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3020 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3040 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4244 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4356 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4432 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4384 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4692 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2308 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4952 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4980 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5232 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1692 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4776 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x00000000000004C0 0x00000000000004E4

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5752 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5932 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6112 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6236 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=5772 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=5324 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4372 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6200 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6096 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5924 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6924 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Users\Admin\Downloads\winrar-x64-701.exe

"C:\Users\Admin\Downloads\winrar-x64-701.exe"

C:\Windows\system32\werfault.exe

werfault.exe /h /shared Global\955c1017a434489cbe8608eda955a09a /t 412 /p 3456

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --mojo-platform-channel-handle=7060 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=5936 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5604 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5552 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=6688 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --mojo-platform-channel-handle=6284 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7048 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6280 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7144 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6392 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5344 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7260 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6372 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7188 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6264 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7228 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Users\Admin\Downloads\7z2407.exe

"C:\Users\Admin\Downloads\7z2407.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

C:\Program Files\7-Zip\7z.exe

"C:\Program Files\7-Zip\7z.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_fr33__setup_kp.zip\КМS-Рicо.rar"

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

C:\Program Files\7-Zip\7z.exe

"C:\Program Files\7-Zip\7z.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_fr33__setup_kp.zip\КМS-Рicо.rar"

C:\Program Files\7-Zip\7z.exe

"C:\Program Files\7-Zip\7z.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_fr33__setup_kp.zip\КМS-Рicо.rar"

C:\Program Files (x86)\7-Zip\7z.exe

"C:\Program Files (x86)\7-Zip\7z.exe"

C:\Program Files (x86)\7-Zip\7z.exe

"C:\Program Files (x86)\7-Zip\7z.exe"

C:\Program Files (x86)\7-Zip\7z.exe

"C:\Program Files (x86)\7-Zip\7z.exe"

C:\Windows\System32\DataExchangeHost.exe

C:\Windows\System32\DataExchangeHost.exe -Embedding

C:\Program Files (x86)\7-Zip\7z.exe

"C:\Program Files (x86)\7-Zip\7z.exe" C:\Users\Admin\Desktop\КМS-Рicо.rar

C:\Program Files (x86)\7-Zip\7zG.exe

"C:\Program Files (x86)\7-Zip\7zG.exe" C:\Users\Admin\Desktop\КМS-Рicо.rar

C:\Program Files (x86)\7-Zip\7zFM.exe

"C:\Program Files (x86)\7-Zip\7zFM.exe" C:\Users\Admin\Desktop\КМS-Рicо.rar

C:\Users\Admin\Desktop\КМSpicо\KMSpico.exe

"C:\Users\Admin\Desktop\КМSpicо\KMSpico.exe"

C:\Users\Admin\AppData\Local\Temp\Setup.exe

"C:\Users\Admin\AppData\Local\Temp\Setup.exe"

C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp

"C:\Users\Admin\AppData\Local\Temp\is-RIJSL.tmp\Setup.tmp" /SL5="$80312,2952592,69120,C:\Users\Admin\AppData\Local\Temp\Setup.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Service.cmd""

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Task.cmd""

C:\Program Files\KMSpico\UninsHs.exe

"C:\Program Files\KMSpico\UninsHs.exe" /r0=KMSpico,default,C:\Users\Admin\AppData\Local\Temp\Setup.exe

C:\Program Files\KMSpico\KMSELDI.exe

"C:\Program Files\KMSpico\KMSELDI.exe" /silent /backup

C:\Windows\system32\sc.exe

sc create "Service KMSELDI" binPath= "C:\Program Files\KMSpico\Service_KMS.exe" type= own error= normal start= auto DisplayName= "Service KMSELDI"

C:\Windows\system32\schtasks.exe

SCHTASKS /Create /TN "AutoPico Daily Restart" /TR "'C:\Program Files\KMSpico\AutoPico.exe' /silent" /SC DAILY /ST 23:59:59 /RU "NT AUTHORITY\SYSTEM" /RL Highest /F

C:\Windows\SECOH-QAD.exe

C:\Windows\SECOH-QAD.exe C:\Windows\system32\SppExtComObj.exe -Embedding

C:\Windows\system32\SppExtComObj.exe

C:\Windows\system32\SppExtComObj.exe -Embedding

C:\Windows\System32\SLUI.exe

"C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent

C:\Program Files\KMSpico\AutoPico.exe

"C:\Program Files\KMSpico\AutoPico.exe" /silent

C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe

"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --mojo-platform-channel-handle=6204 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --mojo-platform-channel-handle=7372 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6392 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7460 --field-trial-handle=1796,i,9846943475214392654,12560834687044095997,131072 /prefetch:8

C:\Program Files\KMSpico\KMSELDI.exe

"C:\Program Files\KMSpico\KMSELDI.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x00000000000004C0 0x00000000000004E4

C:\Windows\System32\SLUI.exe

"C:\Windows\System32\SLUI.exe" RuleId=379cccfb-d4e0-48fe-b0f2-0136097be147;Action=CleanupState;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;Trigger=TimerEvent

C:\Program Files\KMSpico\KMSELDI.exe

"C:\Program Files\KMSpico\KMSELDI.exe"

C:\Program Files\KMSpico\KMSELDI.exe

"C:\Program Files\KMSpico\KMSELDI.exe"

C:\Windows\System32\takeown.exe

"C:\Windows\System32\takeown.exe" /f C:\Windows\System32\spp\store\2.0\data.dat

C:\Windows\System32\icacls.exe

"C:\Windows\System32\icacls.exe" C:\Windows\System32\spp\store\2.0\data.dat /grant :r administrators:(d,f)

C:\Windows\System32\icacls.exe

"C:\Windows\System32\icacls.exe" C:\Windows\System32\spp\store\2.0\data.dat /grant :r *S-1-1-0:(d,f)

C:\Windows\System32\takeown.exe

"C:\Windows\System32\takeown.exe" /f C:\Windows\System32\spp\store\2.0\tokens.dat

C:\Windows\System32\icacls.exe

"C:\Windows\System32\icacls.exe" C:\Windows\System32\spp\store\2.0\tokens.dat /grant :r administrators:(d,f)

C:\Windows\System32\icacls.exe

"C:\Windows\System32\icacls.exe" C:\Windows\System32\spp\store\2.0\tokens.dat /grant :r *S-1-1-0:(d,f)

C:\Windows\System32\takeown.exe

"C:\Windows\System32\takeown.exe" /f C:\Windows\System32\spp\store\2.0\cache\cache.dat

C:\Windows\System32\icacls.exe

"C:\Windows\System32\icacls.exe" C:\Windows\System32\spp\store\2.0\cache\cache.dat /grant :r administrators:(d,f)

C:\Windows\System32\icacls.exe

"C:\Windows\System32\icacls.exe" C:\Windows\System32\spp\store\2.0\cache\cache.dat /grant :r *S-1-1-0:(d,f)

Network

Country Destination Domain Proto
US 8.8.8.8:53 kmspico.io udp
US 35.227.194.51:443 kmspico.io tcp
US 35.227.194.51:443 kmspico.io tcp
GB 99.86.249.209:443 d1rozh26tys225.cloudfront.net tcp
GB 99.86.249.209:443 d1rozh26tys225.cloudfront.net tcp
US 8.8.8.8:53 51.194.227.35.in-addr.arpa udp
US 8.8.8.8:53 209.249.86.99.in-addr.arpa udp
US 192.0.76.3:443 stats.wp.com tcp
GB 172.217.169.42:443 content-autofill.googleapis.com tcp
US 216.239.32.36:443 region1.google-analytics.com tcp
US 8.8.8.8:53 42.169.217.172.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 192.0.76.3:443 stats.wp.com udp
US 216.239.32.36:443 region1.google-analytics.com udp
US 192.0.78.26:443 href.li tcp
US 192.0.78.26:443 href.li tcp
US 172.67.182.44:443 uploader-rars.com tcp
US 172.67.182.44:443 uploader-rars.com tcp
US 172.67.182.44:443 uploader-rars.com udp
US 151.101.194.137:443 code.jquery.com tcp
NL 212.162.153.43:443 mtmoweb.website tcp
GB 172.217.169.42:443 content-autofill.googleapis.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
GB 142.250.187.196:443 www.google.com tcp
GB 142.250.187.196:443 www.google.com udp
GB 142.250.200.14:443 apis.google.com tcp
GB 142.250.179.238:443 play.google.com tcp
LU 31.216.144.5:443 mega.nz tcp
LU 31.216.144.5:443 mega.nz tcp
LU 31.216.144.5:443 mega.nz tcp
NL 66.203.127.13:443 eu.static.mega.co.nz tcp
NL 66.203.127.13:443 eu.static.mega.co.nz tcp
LU 66.203.125.11:443 g.api.mega.co.nz tcp
LU 66.203.125.11:443 g.api.mega.co.nz tcp
NL 66.203.127.13:443 eu.static.mega.co.nz tcp
N/A 127.0.0.1:6341 tcp
N/A 127.0.0.1:6341 tcp
DE 94.24.36.85:443 gfs262n375.userstorage.mega.co.nz tcp
DE 94.24.36.85:443 gfs262n375.userstorage.mega.co.nz tcp
DE 94.24.36.85:443 gfs262n375.userstorage.mega.co.nz tcp
DE 94.24.36.85:443 gfs262n375.userstorage.mega.co.nz tcp
DE 94.24.36.85:443 gfs262n375.userstorage.mega.co.nz tcp
DE 94.24.36.85:443 gfs262n375.userstorage.mega.co.nz tcp
GB 142.250.179.238:443 play.google.com udp
GB 142.250.187.238:443 clients2.google.com tcp
DE 51.195.68.163:443 www.win-rar.com tcp
DE 51.195.68.163:443 www.win-rar.com tcp
DE 51.195.68.163:443 www.win-rar.com tcp
DE 51.195.68.163:443 www.win-rar.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
GB 142.250.187.196:443 www.google.com udp
GB 142.250.178.14:443 google.com tcp
GB 172.217.169.67:443 beacons.gcp.gvt2.com tcp
CA 34.130.135.16:443 e2c21.gcp.gvt2.com tcp
GB 142.250.179.238:443 play.google.com udp
GB 172.217.169.3:443 beacons.gvt2.com tcp
JP 172.217.31.163:443 id.google.com tcp
JP 172.217.31.163:443 id.google.com tcp
DE 49.12.202.237:443 www.7-zip.org tcp
DE 49.12.202.237:443 www.7-zip.org tcp
GB 172.217.169.67:443 beacons.gcp.gvt2.com udp
GB 20.26.156.215:443 github.com tcp
US 185.199.109.133:443 objects.githubusercontent.com tcp
GB 142.250.187.238:443 clients2.google.com tcp
N/A 239.255.255.250:3702 udp
N/A 239.255.255.250:3702 udp
FR 216.58.215.35:443 beacons.gcp.gvt2.com udp
GB 142.250.178.14:443 google.com udp
US 35.185.21.228:443 e2c24.gcp.gvt2.com tcp
FR 216.58.215.35:443 beacons.gcp.gvt2.com udp
GB 216.58.213.3:443 beacons3.gvt2.com tcp
GB 172.217.169.3:443 beacons.gvt2.com udp
GB 216.58.213.3:443 beacons3.gvt2.com udp
RU 2.59.42.250:80 rxfor4sb.top tcp
RU 2.59.42.250:80 rxfor4sb.top tcp
RU 2.59.42.250:80 rxfor4sb.top tcp
N/A 127.0.0.1:1688 tcp
GB 95.101.143.182:443 tcp
US 20.42.65.91:443 browser.pipe.aria.microsoft.com tcp
US 8.8.8.8:53 r.bing.com udp
BE 88.221.83.185:443 r.bing.com tcp
BE 88.221.83.185:443 r.bing.com tcp
BE 88.221.83.185:443 r.bing.com tcp
BE 88.221.83.185:443 r.bing.com tcp
BE 88.221.83.185:443 r.bing.com tcp
BE 88.221.83.185:443 r.bing.com tcp
FR 216.58.215.35:443 beacons.gcp.gvt2.com udp
GB 172.217.169.3:443 beacons.gvt2.com udp
FR 216.58.215.35:443 beacons.gcp.gvt2.com udp
US 13.107.253.254:443 t-ring-fallback.msedge.net tcp
US 152.199.19.161:443 fp-vs-nocache.azureedge.net tcp
GB 142.250.187.196:443 www.google.com udp
GB 142.250.179.238:443 play.google.com udp
US 172.202.65.254:443 arc-ring.msedge.net tcp
US 20.42.65.91:443 browser.pipe.aria.microsoft.com tcp
US 8.8.8.8:53 254.6.107.13.in-addr.arpa udp
US 13.107.246.64:443 fp-afd-nocache-ccp.azureedge.net tcp
US 13.107.246.64:443 fp-afd-nocache-ccp.azureedge.net tcp
N/A 127.0.0.1:1688 tcp
US 13.107.246.254:443 t-ring-s.msedge.net tcp
US 4.150.240.254:443 arm-ring.msedge.net tcp
GB 20.108.172.194:443 b62bcf575f0a0fc29cf8da7a1813a11c.azr.footprintdns.com tcp
BE 88.221.83.185:443 r.bing.com tcp
BE 88.221.83.185:443 r.bing.com tcp
US 8.8.8.8:53 194.172.108.20.in-addr.arpa udp
US 34.120.190.48:443 kmspico.io tcp
US 216.239.32.36:443 region1.google-analytics.com udp
US 192.0.76.3:443 stats.wp.com udp
US 192.0.76.3:443 stats.wp.com tcp

Files

\??\pipe\crashpad_3556_ITCDZUILCKNBMEYR

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 fc876e1e0dd8af637394d0cbda19325a
SHA1 2c0a87ba88f702097f0ac5a37d3291e462aa7d4f
SHA256 ffaa8219a6bdc703e41e401e5043e1ed936ee0975d5f73f4199ff81972140b02
SHA512 f4853d8dfaa707a7e52e8afc262fb638699774df3c4a5cd36c960325f0d86ff1c7d3536af522c612fada57398f45bdea165f18806b285edb981f16a5420ef926

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 feff04a5ce01b4654b95064f178892e0
SHA1 a8fa2fc464d192a1b94241e530e1090e8f149a02
SHA256 0b2a0f663082ff330bb87ac7a626ef801fc7a7fb8664efb46bd19df68a7f3654
SHA512 bace71e7d0df88700759755e86aee52dd6c2c7dfa58640e96511cf784a72eab629db3526881966c1c04ad6fecfe55b4676292b443cd3453d8302e14cda10ee25

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 a0b6b2b26d0e0e1a6d2eedcfc853a3ea
SHA1 925b52d16c9166fded6beb39db035d77626eb9bf
SHA256 8945c9d82d3d012e076403750b4d2d3b3eb5e2b56e06f9c70377686923cf7723
SHA512 83084a06d2873c2c487b67a498bb7fa9a722a682bef7ada2c6b93ffc77161c5a3ded5ec924ee565ad721cfaf443986e03b171c19d9b4ddc84988867211ae2d4c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 4f675b6574e330df2385d1df4d8b2c22
SHA1 0a8602fba6cefbe6274abc44029fa6c226c1313d
SHA256 82a213c594ee95823aea1c973ad0a078c10d455f60d4104a15eb1dd80f72129f
SHA512 7c9a5d7225213d43969ce5488a70f916daa940f47adf74eb869d13abd11e69e3a5204db7d7197ff0353c50bb32d7b7efaa1b97afe9bf6065fc6069230128bbf6

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 55fcec2fd0e9dfe30b7af03a441cfb96
SHA1 1a9f25530cf1d44a702fc5866919c604227a41a0
SHA256 6f118d9be338532156c61d492083ae70becf19ed4c658a46b258b6fa04962cc0
SHA512 84f1b4839b9b55a0dab6301bb61a7cc5ff74c51d174bc2cf910cf9d8f929ad1a9aa6cd50c91920cd6baab8cddafb62ee862159c618ccb3afc20d1ab624334bb0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 e167cf5848d213f003ea0aebf87f73d4
SHA1 4fe6b063a7372cca93eaa59c29851bc18457687e
SHA256 e58f9b69b8a0a2a3b2fd01709d7b8c66ce6765acb5c72c00f903b954c3602550
SHA512 be0397df2611e8c658991c3d52785195247a3b25da9dfda768323066f0c5b67f95f903b33fe21f0f52755856f28a09be8b812523e3679c15b824638d1b1f8302

C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

MD5 f3b25701fe362ec84616a93a45ce9998
SHA1 d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256 b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA512 98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\Origins\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 9508b7313c7c9c642e6760c1794aaaf6
SHA1 de1e3718dab6a173272e41ff40805b398956b270
SHA256 083a88fda57609902ed0a87aec5983f9f3149c959cb7b1974f0d98e72f63cf13
SHA512 411b596bc689bbf0b93eded5ab6fa7baa4324d2af44bfa43dd523995538686cf67ac4cbf350b2363fbefe4297f1536843d110d43677a67396292f6956900c688

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 edfc79688940fe17699ed66626c003da
SHA1 88529cbd345d25fba2584348fb1a57cce6b82058
SHA256 14fbceb7e8e234702f5e5953adc6271a32cc9aec2e6f37e3002b6f3bf8f0e7c6
SHA512 9698026d5d33d6b648fba476fb9f63b9441b1bb75cb0aed0cf6f7558756954974a011bf677dc3f8c912b3d677b81f04ecd5131d692bdaf8cdaa94ca990fcabd1

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

MD5 9998de99f181dd30c5b8c97bba0db80b
SHA1 0274f666916ccff6154572ff97632abea1b8867f
SHA256 59e364b9c24f7dc9897133369e1be4a423962db680e6bb07043fa4e2a69b21a8
SHA512 061becb90eaf228c606e7f727767abc1236d1160d4da8f0b711c4e8fbd8c30ea7efaf10ce86ccaed6e9a3dccd1ec02e62238a4abadbff061720b9b4cc8021bb7

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57e4e2.TMP

MD5 ff50306309c0aef6662b24143bab6225
SHA1 adfcf3f182a81862a85c1b0324cfb0155429a969
SHA256 d9fd25973cfc1f3074a53ab4fe3aa1bc837f294ada821ee96c93f2d906a03418
SHA512 1e4f3f20e6f5797e4f37ce8f60a4ecdd1b895c7b95f8ac0a7d2ad54fdd4a95050d64447c46045cd34fc9d4ef10b390490ab40e2a977534152aa780a0d9c62c47

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 e962542563a56a6738b2afdcecd50dba
SHA1 f1087cafd1114a1d5dc4a71c482543cb274a28eb
SHA256 9221b3019efb675300c9b8cbf9fc32d7fc9614d31bdbbdf028acd922e36dd370
SHA512 e394490b87e2e64a9226fe3baa670fb006005d769ab4589cda9c2babb12a79b6317c8816e5a94a5a6c78d1f68be19076b27e5aa1272642c1cedfd25ce04b3ccc

C:\Users\Admin\Downloads\fr33__setup_kp.zip:Zone.Identifier

MD5 fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1 d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256 eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512 aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

C:\Users\Admin\Downloads\fr33__setup_kp.zip

MD5 9c4eeb80a174ae1609b6704d2b905cba
SHA1 0ea4d09ce9ed6722e8e0e1290fa7b339b474f74e
SHA256 4cc4b99d194111f7f7f13bdee10f887d52813c8d677b939cd97844df99195845
SHA512 272deaefcb97de471a92d10c7992166f7dcd1adf61dc1c64d07fd1bba047d047be1667a17efb6c39c466b5847a19501bdca1253b27e39a0369d452c3046a19c5

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 48eaa9110d69d526a456b3cf0a64393e
SHA1 6738aa66040f1060e6f04a36d085f0c5f2ec5d2c
SHA256 b0794ecfc75e9f039604d327c606578fb7c921264aac9c7a1ab0b64a01e64d0a
SHA512 55b1bc4913f66e6ed27f0fd40e0f09be749545f4924d75939b7b611d9a817f58f2a23ae53919c73aa823d435b79a83c4dbfcb71f640da9dcf424201d11648dec

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

MD5 1c877fbaa2ecb369127de0c2bd91a1f5
SHA1 2f91b9217e3754541d183b7db162cc9f5167f803
SHA256 5dbf8053776bc9a4598920944dc6edd631a1dd58b602dd8ca51f59a2f61833ee
SHA512 529037c069c093c583c3fedb661c0bcd21957ee85ad870ded9ecaddfe3ebf30bdee02a1e159fd06237b977822210637923145adf6b9b05c7349f353b863ca5ef

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58242d.TMP

MD5 96a8031a2c0575b05ad86e53499348c9
SHA1 5cdf466878cebdbe92c3d68d105ab05ce0dcfbc4
SHA256 43c4453b0e36cc6839b1f93ce1bcbde99ea82d67a943a5ba0fb0ca2faeca9571
SHA512 3104e4e0c58efbff252b57c39ef9e35dbe34acd3acd55af5887737aceba8a75ff7289ac721ec30fadb89b13659b8a76280c8b18666f71335c6824daf749e2bf2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

MD5 6752ff15fea1ab9876127539cf4d62a5
SHA1 c61394a603c4d070b825b998dccbdece809f2d05
SHA256 1d886c39538387b95756f69fd41987f63b63162344d69911770cb7580ce2c1b1
SHA512 720e6aaff5aecf6c3d350c8771beb874baa6535e3b9d1a4288be61fd9f1818eeaf4dc439d6a874034cbb3c5c95485ad51f5e90c072611022dea79ec8eeaec281

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 839034fcbbfd836a4259e47bfb720aaf
SHA1 dbdb446d1a3a67172bceeb59d79f1a4e2f5acdb3
SHA256 625490b7f10953ef2fdec7c1db6dae042e46d29f38832eb1675fd57b96d173e9
SHA512 dcaa67b22c2ac3da70fddc2616d76c9d8716ae5c1ea90397a4f55ab309f62e31a6307502ef829d4adc1449e912d2760717821cc1ff8e27353ea19ea8d8557a02

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 549046d25be7b62837e2a346178e32a5
SHA1 812ada9605d78451adbcb851d41c5daa0c98fdb7
SHA256 7f317cfb1401df4bfd0db25f61e4e4fa54fbc215d33bad4db2cf1f2a8ee7ff50
SHA512 abcbf22266bfff805cab57db328440f48b551015ea38805f5c4dbb8005a5bf80a4bd5f8689963c256ec2b94c7d1867a1b20a970b751e3320a38b022bacab0e0c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 dba9c9788f38a48c4f3c69a2695c59a0
SHA1 147bf6316d8d88f4a08d7c9066f996afb14dcb0b
SHA256 b572c8778db36db8acf583e8cd27c9ad211d35f0841a8822e0e6eec68dd82252
SHA512 b3e773473d7bb31bf7d6004aa43f7b54a6fd71797cbd610d747e0ceb8aaa178fc7322ccc0dd64a2f84c4beecae6bb4f99aa860dd0c902992afe4265950d26d43

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 42dc62dbbba1d89bfde7eb0b2139c13a
SHA1 01ccab0e814405de60ff785045415d1e685703b7
SHA256 499ab8ad8e69087cafc63bb5dc99897125cd933ae308ff73059a05eebd578d91
SHA512 e3d53e817fa93d98620ead6f20d4e1bf3c979eefbe70ffa5fe0076474b44ffc6f463a98d7d73a4dc1b16086748781f32b574709c5d3108c7e2258fa8f5fe75bd

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 eff4692fb9070fb05d8679e9078b68ae
SHA1 054d5730e8f87d2b30accdff293c86276558940f
SHA256 2d84a148131797b47f623165457adcf95b1b207b6daef07cc1aaebefb53caec7
SHA512 b3719b3992d9f78c0285694687e531a3418b025957acf02027395632932d8254e6c90f3d864a7e92554bdae9b0c5b7445dc085909fec4fbd49d7d8e8d2849415

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 54367b2c7f5631ed37f6dc3f1768fd4e
SHA1 bbf04b48ee1bbc8128d9ae40501e47562d4eae33
SHA256 ed1355bc041c60f5398effad033337d606b3446424c759553e4cea62d81d761b
SHA512 6423535bc9387daa239b2c944e4ef4c31ed8e39e4b8d6a067ac27f4fb0017f9df7acbcf2f93a2cc6150998400048ce102185286691c38af65202dbe93e2587d6

C:\Users\Admin\Downloads\winrar-x64-701.exe

MD5 46c17c999744470b689331f41eab7df1
SHA1 b8a63127df6a87d333061c622220d6d70ed80f7c
SHA256 c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
SHA512 4b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 75fa2e1f87ff73ba48d4834c3c355293
SHA1 b3ad46a3f5d4d82ccf2d2cdece428c48c313e4cf
SHA256 a481d7d0a2b761878d5746fafd820910a22f815edba62fbbc6055dc7551d286b
SHA512 79e4f38a838407fb50512e127527a486a1c4dcd2eeb4aab869aa4a0c24dbcd2bfae8b5251323e8c160e06b78568b0e547979ada21c4106f91fb36367143a1d73

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\87d29d12-0d8d-4bd9-b920-08bf7ab8f3f3.tmp

MD5 cfae036bbee1b4259243d8deb637c66b
SHA1 b43e545c55ed23d17ba8d6da6b0fd27516afed8c
SHA256 543bccaa2adb110f5b2b33114a46ff89ec4c7a7e16b424e7aa5006868c7de7f4
SHA512 af690b628e6af0e0171ae30b4ef68879cfb6e3510b7b130ae35b5b915c9984038a4d6a8004d890ca32c14dee318442453ba55fedc80d34743696171968c5bb87

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

MD5 f30ea88de0770bc8d820d67d7753b151
SHA1 042f37bc4a0cef36da75ca1c0c57ec6b8325f168
SHA256 9714574ac0254af30e9dc20ac134f5baeb137beab53c8129a2d8bd67aad703e3
SHA512 346c6fda2e22e43848603d2d182fd695566ecc6a3259c730415c04d45e9d43ff8e3aa583d8ff60fa1809bfe63ed5b64999dc818a3d52cc25e0a59d4addf75bef

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000013

MD5 caaa5222d179a24ca5540080c7018b99
SHA1 1f415a7a73a12a4c16f25709504f4e4e4beae9dd
SHA256 b729255f2e984a20fa0f0eb07e08368cf468fd17ff27a7d1dbb4042ec261d8cf
SHA512 71b4f878aa154ba4a8523c2e36faa8dbe3cfafa082b18796d8b69539dee9506253b9e55fc9b71cc2c9027d22ae08587b0e2ddadbc8d3395dbb73584d1ca1ebcc

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000014

MD5 aa12ea792026e66caab5841d4d0b9bab
SHA1 47beeba1239050999e8c98ded40f02ce82a78d3f
SHA256 65fe153a832452e97f5d484440a7047e314d3a83cb61ad2508fed48a820e1de1
SHA512 0b2b1bb8851c60c9d4ab1d039b990a4de5799c97c50b45f64e36a21849c14e785f69196f674ac225b1419d7f501338054074cab6203d041361a4fa1ed8802b27

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 b3a9a70aa7840ddfc21b5e9d76b5ca16
SHA1 f37885d13de36fd32af1de10eb3a4e5266bc68a4
SHA256 9b73afda98d85c98acfd23d9900613ed400529924d7dc7e556719f855cfd8726
SHA512 6e4b1f05532ad52a0006fd99d455d01fbe2679d53140291b603a20afd3e74fe9673681a021605a7808ebf6298a982b4178c6b417174401f02237c8b574275c60

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\58ea73df-5c25-477d-8706-d32d0f67db0c.tmp

MD5 fd6c754bef11032e799ab59c969dea8b
SHA1 35db18febc9123ffeeef32d2ce96687151b98b7e
SHA256 51f73a17b352e668e10af4f359f693642e7b7c2a730e6504f137cb4cfe8ad679
SHA512 4a21120ee1ac9d41c9106fbf7620994a496acc43840f25a0abec8116071ca0b51931f088cd105d8ee9db78ac8ca6608b5603dcd5ca843275fe8320de4cf560ea

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 5faf2d466c68fbfb5df5638786a35ddb
SHA1 8b9ec3998feabf3f37c92fd6c6706e6208f39dec
SHA256 9939de236bb6f414127fac5b5334716ef1eb3c0946997aaa2c522281bc2ef925
SHA512 f278659ffed424d3d4d7ec6337f8712afb1dc7e2fafa39f21e2ccb56ffbfd1b1f748d99e7406a2b4bebcd258c84e7287623ad983a59ca7c8b30914ba00b7646d

C:\Users\Admin\Downloads\7z2407-arm64.exe:Zone.Identifier

MD5 c62e266c717c1f0ea439828715738fc0
SHA1 67b46db4440e4aac79ddcc3aeafb6a2df27c28d2
SHA256 6e943bc4bfb2ddea0d696e4722d0ee236a5f86a962dd360d622f001e3a02256f
SHA512 3c13e9bef7e522cad0a7da93d20a728262ce5089962c0e1f0f17f0307b39f75be5beb741f993c10d1db76443214ed540c64c45e30ffec3c23c4ff8ac49b440f8

C:\Users\Admin\Downloads\7z2407-arm64.exe

MD5 64e16722dfcb1452e6980c104df2847e
SHA1 20b4fb000386745f78696b85e9ed5c32ca6cd04a
SHA256 ffd49da0ca77d5376d9040d6ccd3a9963f6355f3e796455812569b4c61593f34
SHA512 ac309aa1240b9e2402727509f6b475ade3103b8daeea5dd4c3b7e3c1c74d0ff4cef324f1a33d6cae18d2778f77cfab77810f96d7ffbfc77fd66abf5454cbfb6b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 411a25d222f6d041b626d4861e14d0ad
SHA1 bd389e52b4b175a5257c09dec9ea158c6aa85497
SHA256 ea14f4956caa1e0c64c04a00d4106e0b932756a2cac80f89115c7911ff923cb7
SHA512 82fe0954fa030ef91222c49b3b5d38ce44da8be4e3f86cdb9e7076050a66aa03148515f010b4dde51c3391860fbf354d18f84704bca0beebc53136dc64d52fd5

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 e390448a4c3ab151538bd001f318f4a7
SHA1 a036b93c742e41db73386e6e7580863957b068b4
SHA256 ea8123a514bce77f074bc1e10a43917f1d1882486146d8a709f01fb7d80e4dd8
SHA512 60b95b64fb1c8efc80d1f3827fb1d2f9c6de01e32c900f7bd266b436aa66aa7ce1adde432c51051ad1cd9d6d66d991cfcf4854cae03cd7f7692839d22fa7df9f

C:\Users\Admin\Downloads\Unconfirmed 633962.crdownload

MD5 3f6d2cef65fe49a38190781a0cb46707
SHA1 6132b1cbb8b81a587d3eda3c9ac3a1c434fb13b0
SHA256 151261d221ba0f6120c7f16700ab0724b92ff3230f05a89ef15dbcd8198678bb
SHA512 731b8fe2c578444ce859bf2061c342b13716e49647d99517358b69740e2f6e49d751474c241f25381b0e194defc2af9fe0f434aedd3bd96aa39cbd19dd457a58

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 fca9b38fe8645186073c5da75b4f9039
SHA1 fd3c0287d5bf56f1fe77ab64dabb83a269846d73
SHA256 27c108a7bd62ffde89dce4d1f8fbf589d67ee090e3300b13408390cb9ca5d905
SHA512 594a36ed767e7822640f131097d75c64bf7750620baae545f4e80edfb817cb115c808f05736cd6fb63bacd0edafbb0ac92367cce7e95b38f110c167b8c557e16

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

MD5 daffc6a506fddcf456a619b7132ab029
SHA1 9ef23ef12939320a8833ce01bcf65a9dbe55bea9
SHA256 88d1117ef71720977e29aea074ab59e9452bb8acab811903a5e3b0e503b33c40
SHA512 1d4b2777f39eeb868425354e36f6e016414a693ecb22c321391013bc797e2241401090f4e5f53f54109c7f5cb790b60732dd807bbb8726af406bd74c2525a112

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 0bcaf9c6c3adceb01c7c8657250bae4e
SHA1 3c11a679c438fdf74d9d433695d82ee06ac65a83
SHA256 d0fe66089d7e8014b253ca1cb8203f633e6181d9f2131874a71fcb7d67aa97aa
SHA512 5b11af0c0b35e7854cba3b0c77a0f24bbe7cf70002e7751930c6a150d2f4874f47cb4e45a81d83e3f0844b722e884dc6fd64864284f77896ee1e2554f868f20a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 d4bef987b73ac64ebdc6c6360826a12e
SHA1 e3b5500baa359534cd2ee65ec573281b8cc1f44c
SHA256 cd6984a83ac5187f51ce0d9e4262e791f167ffe1bb49ab4652f241fd4487fe03
SHA512 184e1775ad8704963effd6cdff2b3253fadaaba86f0c6e00fafe93de1d3bd151570e75792bc10501e2116b8a5e2da0ed9299424cb1248049f8ff78ca649964b3

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 56a9de8fc7bd15d9d464010add4e2ebf
SHA1 f21313b2d9a9b82ec61293f6e27722b53979fca9
SHA256 2108246566ec5b88d7ab526df6614c26efd91209c9c9303cf891545d73795fd6
SHA512 5bc1de07b9129fd68c08e848ac19b90ed17a39aca5bb7aced24a8dee2b158d2bb854c069381fe47e0bda6bab746e9e2eeeb98548b3a8a647584b46c838b14036

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 294180807cc283075da2bafefd89b7de
SHA1 455cdb7d93af0042c7352626cacf01cda38b65ef
SHA256 8b99f766f7b92c59bb75cf01692c404cf3a31701ce1b34eac065da5391d67ac8
SHA512 748ef8a21dd6ed1b05b38abdcf10e8f8f0853a2335cee779594696f147fcbfa6eb1dd5a078b9941f24f9fd3546fb9b34a1d68c470ac7abbe0c17ba8c8224f619

C:\Program Files (x86)\7-Zip\7z.exe

MD5 05b169de0e4856a79352f4d9b66cfc67
SHA1 9cf11c2555e555cab20c317f0535fcb441b21491
SHA256 5ee9fd70a37dd113826bc6ca649e906a230955704d411d6252b8709399357f82
SHA512 e73b63c3dc97704786a9ab2eb276ce846f3ed0fb144ac8081799fb66a88ab0d2cd41399d20fdd1d4dfd2a0a4a88d6e968b0b357790fcdddba7e99dd26972393a

memory/420-1043-0x0000000000880000-0x0000000000881000-memory.dmp

memory/420-1044-0x0000000000890000-0x0000000000891000-memory.dmp

memory/420-1045-0x00000000008B0000-0x00000000018B0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Setup.exe

MD5 a02164371a50c5ff9fa2870ef6e8cfa3
SHA1 060614723f8375ecaad8b249ff07e3be082d7f25
SHA256 64c731adbe1b96cb5765203b1e215093dcf268d020b299445884a4ae62ed2d3a
SHA512 6c6903f3a3092fd3d63c373189f2c06e12de032ee4fd6b80a15f58eaeb2079f3ae8a8bcdac85a358b1f9070b192b1c8260f9aa127d009b5afce475f966e91326

memory/3764-1057-0x0000000000400000-0x0000000000417000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 2e8dec619c41f63d7ff997ef0281ff60
SHA1 28bb26fbe2d9a3cf82555f1674eecd4cee641169
SHA256 71f91ffeec8c7044dcae481d8896e8a65296a271408c5f10c50184a8a87ee192
SHA512 e4e26b442d5179fb723fb01e8847a9e816cef165d333dc806fb3dd3b402621f4cd27199ad97bb18052b2ac031f9c3e1f2fe2ca79636916eb69e68dfa3e51dbcc

C:\Windows\System32\Vestris.ResourceLib.dll

MD5 3d733144477cadcf77009ef614413630
SHA1 0a530a2524084f1d2a85b419f033e1892174ab31
SHA256 392d73617fd0a55218261572ece2f50301e0cfa29b5ed24c3f692130aa406af3
SHA512 be6b524d67d69385a02874a2d96d4270335846bece7b528308e136428fd67af66a4216d90da4f288aeefd00a0ba5d5f3b5493824fcb352b919ab25e7ef50b81c

C:\Program Files\KMSpico\UninsHs.exe

MD5 245824502aefe21b01e42f61955aa7f4
SHA1 a58682a8aae6302f1c934709c5aa1f6c86b2be99
SHA256 0a265b4bb8acceafaffb001632fa7e4c3f8ac39a71eda37f253e15bc1b8db90d
SHA512 204b39e31f22ba99cf09c5c8458fc94ea21b47aacc4abd305f71ba20a35d36bfc0ff53b95180542911c9c6f259db897dee76090d953f7ee18a8079caefda7981

memory/4624-1848-0x0000000000400000-0x0000000000417000-memory.dmp

memory/4624-1850-0x0000000000400000-0x0000000000417000-memory.dmp

C:\Program Files\KMSpico\KMSELDI.exe

MD5 f0280de3880ef581bf14f9cc72ec1c16
SHA1 43d348e164c35f9e02370f6f66186fbfb15ae2a3
SHA256 50ebfa1dd5b147e40244607d5d5be25709edf2cc66247a78beb920c77ac514cc
SHA512 ac31a972e9e93e6671f44d403139b0db89d950097c848fbaf6b9965b722215f74e9ed9bb9e083d31328101e6fcfe7f960a08b3bea0813900f11d5c1bb40539a6

memory/1728-1852-0x0000000000BE0000-0x0000000000CCA000-memory.dmp

memory/1728-1853-0x000000001BF90000-0x000000001C4D0000-memory.dmp

C:\Program Files\KMSpico\logs\KMSELDI.log

MD5 c2365cd3b9f9ff090223c5a2863a29ba
SHA1 0dba0d17b915e61a61177dd3f2f33aaac74f722e
SHA256 d092ce04b2321b7370ccf4c19551626be9f7b8cd1c8cfbaa3754d0015daf20ba
SHA512 1325852f4a26c632591d3b27298b800f19c1be5d4defced62bc43e8005dc246363bf23d5d33e7f51bdf15018fca68232302bcf965390876867869cce8619c8fe

C:\Program Files\KMSpico\logs\KMSELDI.log

MD5 752a4ccee9ad7bb7a095328ee10e5f8e
SHA1 cf60ccfe4aa37c699c9e9faa8542916018170b6e
SHA256 14334a72074912ec900d9d75e20e722c6780d068bbfdf54f6ba20bd5af36dc05
SHA512 3dacedac861033aa2ae1a7973ed2acc5d0ba4eff9085ce9eb1664b552d5218e59afbfac3ccf8fee9bb2e9b399274f94fca5597b364fd96c8cdc9eb87ca3d2106

memory/3764-1964-0x0000000000400000-0x0000000000417000-memory.dmp

memory/4088-1965-0x0000000000400000-0x00000000004C0000-memory.dmp

C:\Program Files\KMSpico\AutoPico.exe

MD5 cfe1c391464c446099a5eb33276f6d57
SHA1 9999bfcded2c953e025eabaa66b4971dab122c24
SHA256 4a714d98ce40f5f3577c306a66cb4a6b1ff3fd01047c7f4581f8558f0bcdf5fa
SHA512 4119a1722202bbc33339747ea02fd35b327890d55bb472cd1e2146ca446d8ba6fddb1e8cf8bbfaeb08aec8ed2a9d5c0fa71b73510d409ffacd3908fa72bb53b4

memory/2336-2153-0x0000000000340000-0x00000000003FA000-memory.dmp

C:\Program Files\KMSpico\logs\AutoPico.log

MD5 2e4b42c6b30eaf94039a271978f62655
SHA1 4a21d44723fc060e5086e165ab07fcab424d1822
SHA256 2bc3a18e0feba277d3ac6ed93058e69362d9d6bebf71caa33a228fde38a899e3
SHA512 688f7a99fd326acf770537601d95c8229a5f987b1afdaf6d532b378882bfd8fff8752d42465ffd585109d4590fc5b43ac1640640ebe54f51b404f2a975fc156d

memory/4088-2268-0x0000000000400000-0x00000000004C0000-memory.dmp

memory/3764-2435-0x0000000000400000-0x0000000000417000-memory.dmp

memory/4088-2434-0x0000000000400000-0x00000000004C0000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c50c15723cde63296adfa984a8b56e92
SHA1 adba69d79ab0c789dcb95c819a4ccdd9cc513a99
SHA256 814a9c170c04fe774201d79714d12046b8bb114b7a60808aad0a4d78c44ecc08
SHA512 9284fcec5ebe5c949856617761872c9cb0ecbabbbdfb65e02f40e6bcbf98547c7bcb64ae02d9834b0f091c887abd8ff66510793b965c139d40aaa0810f2abfb0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 e1f6ae8a1b588b01dc8b84820c20d1ab
SHA1 8f3c2f374ba1d59c3e287ebb48367f8435ce1d41
SHA256 0fc7e65bbaa9cc3ddf5bd17f316d09d1f3cb8f5de5572f8f9f499568db48c5a9
SHA512 b07ea4cac6eaeb762cbddfc383455b86fa3d60c0796475ec91feaee009c677df0a8bd7cd0d6d50b4b6b250556b2b266dcafef35418a94d5cbd08e3f446eb289b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 e3f761e81eab1644eed45e71a1c9c3dc
SHA1 da603398cb2f796f14893a097af6a1a485d35272
SHA256 bc11c383626a5adaba05e0f257630368e0b939a7e7c346a9b2c34f941c7d92a8
SHA512 b91e534110af54634408d95a785b0410bbe30ebf13433df3758a49af2dafd2869b2aca5eb1b0d1217a7423cde85e405614e6be824132a33c7eab2b4276f59539

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 747b91e69f9ca55a462ab9fe8dd8b398
SHA1 9d17f4aacd181187b2f07c1bcc92b34fb73b2c2c
SHA256 e1e7a40cd9d0d397187ecbd3c40bbb7dac7f60327f85e652ec8be57cdc094cef
SHA512 14bf5716e527c8c6f211d28a96837cad6384fe48e8489b234a0ee2fb8c60217bab5f61e179af753c9105f28b29a62c0d41191b779e05dc377c75927a0eab84f4

C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

MD5 fab9c6b7ec704e761b66aaadfe7e0e32
SHA1 71f72aed637d23d693599c8685f4ebaefff134c9
SHA256 4a09d3cf3007c4f5c11afa441c50e382c5dbb998a79e3d6f8f13f5f4ce918ae9
SHA512 5a4c76851b1e394f93f71981e4ed99a38917ea4a7a8282d21e6e3989faf37278fa8c137b8f12592b161f602eb3aab8ce0e6065639ba67130a77e658a90dbce16

memory/1860-2507-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2508-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2509-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2510-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2511-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2512-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2513-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2516-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2515-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2514-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2517-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2520-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2519-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2518-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2521-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2522-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2524-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2523-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2527-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2529-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2542-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2541-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2539-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2538-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2537-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

C:\Program Files\KMSpico\logs\KMSELDI.log

MD5 5473b34b863a6a3c957acba49499f0ad
SHA1 db5a8209451f569690b57148f03c004eb2c17dba
SHA256 2fac85964bd159f0955870d6319ac83b0f1f0866a6cd9fcad942b60955012314
SHA512 0b21ff482997df23bb980f66225e98410f20f6b6dbff3674e8e2a4bf485b2761660f8cec95971aa9e5e3f3db5f0f21f3da9ceeaada1eafa034a79fdabcdf66a0

memory/1860-2528-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2526-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2525-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2558-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2562-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2561-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2560-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2559-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2563-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2569-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2570-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2568-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2567-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2566-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2574-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2573-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2572-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2571-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2579-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2580-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2581-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2583-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2582-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2587-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

memory/1860-2588-0x000000001FAC0000-0x000000001FAD0000-memory.dmp

C:\Program Files\KMSpico\logs\KMSELDI.log

MD5 bfb588d61eed0435deeece25f40ec6bc
SHA1 b9d9a03d6e1cf843653b577e639b6f37b4e9358f
SHA256 45753b4bc355c490c4acd33328d14c1c459e5b9b65d6ab9729bd93fca6f5a43e
SHA512 318037a93a8cdd0c1de42c3453be78ac96b0f15e4e39321240dd0a8bfae4ec0b9de08c4119e6437738311740ddb070b5ef63c7c28963bb2c1182344adf5b8c13

C:\Program Files\KMSpico\logs\KMSELDI.log

MD5 d91b5cc70a7b5186d1883c1e6a8367bb
SHA1 12c7a9ab3260fb92c1e2d37daf0395129b22556f
SHA256 4c0bb9b203d8ea742f55b52134142104c6a12e18e994bf3503c4e769175aff99
SHA512 ba71606fcca517cacc002e8bd17c541c19d996b06e0a6a450d91d9daa0844ad66db588805b77885d2f3d0561fe033f8015849bdf5376b3eba587f2bb0b6d3efd

C:\Program Files\KMSpico\logs\KMSELDI.log

MD5 159a07ef8cdf4b10ea9c467583b0b780
SHA1 d34475ed5147b7022b35518693183df8a33594e8
SHA256 bc6008687c9e5ad4d6de86a19bd59f29f181bbf0733f4a04b746ac3d79b5b111
SHA512 1f466f9777f92669716071a3546a632543199cc263155e6a8889903ccc9938de6d76e48d5bce64ecb1a3413c3b0236a7dc838b3b00759657ebf5dcdc456b4a67

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_00000a

MD5 dd316ec94e437715dcac21a3b0ba1440
SHA1 03b1925fc0a6fa6c3b215218a5e84bde8fcbff1a
SHA256 13e406463245ac212bd7f0ac9b4a0ffb47d7e03575e3e665f8e328351e097c3a
SHA512 1c1305780362cae6269a8b10fa2c072a0eb9b98688bcb3fa22755e522a5257e57aa9d83eb95906942401fa73b71b2e79a8588a7f985758feb35ea06739c995b5

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000054

MD5 bfc514d8dd6440673546fa3823c0a62c
SHA1 db84394b11a4ffce751b98606a7f42aa7f0a1a8b
SHA256 496852088abc36bc768282c2d675785d90b7bc544fb1dbbba2020a51235342bd
SHA512 52c2fb6fd7b0643ac78fb6ab218c90a2d080673467a624a21d72be4e64f44ff89fadcdc5e1cf10728d6b789e49ac797213f5d3844855323585cceef6353a6c08

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 ae5750f8886176ee6e125d736eb99c88
SHA1 eecb03b887b431f62ea91a2327ddab3839910663
SHA256 795c4064ff0ddba6be6ef3c1f0fb918d594db92fb511b007d710e49ead9969be
SHA512 44a342dcd76be8a7060a3b62cefe3a86c5b50cba4b12c5ea182220076d59907dad9ab398630013d2777cd31c9a2818294d29cdbafc302deead6e8c28028acf8c

C:\Program Files\KMSpico\logs\KMSELDI.log

MD5 352a21785f1727f650505ca41d409620
SHA1 89a90fc1dbcda10ca00a2de54112ee3567e9ba4e
SHA256 72e72e9539a597a7e9db12f32b627b861b63451104ad10ce63eb79f898baba32
SHA512 72b40ae5ec4b00752b24cb4fb4a52284b141b48f918fdc957e52dc5097b20d99b77c5094ee6c54b00538b14c97cd77602fe1ad56e8c89d827c015bf9317a367e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 9cd60e8d40f9c9c41d747b18bc55b4c9
SHA1 c0a9a3936251cb052bb6a9e034513ba9dd3981ca
SHA256 03b78ad9938aacf2e2c1ff8a107f011578f18a677b1cbdfa89141d0522c13a42
SHA512 5593e85b61b9b605932d168659d114ce2ccbec5df986ec8ac1f658c7fe6a2c1b9717120932c6a6d31244e1d1c336aa353b244c4c98d8ab690882614026adbe9f