Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
278s -
max time network
274s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-fr -
resource tags
arch:x64arch:x86image:win10v2004-20240508-frlocale:fr-fros:windows10-2004-x64systemwindows -
submitted
06/07/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
Injector.exe
Resource
win10v2004-20240508-fr
General
-
Target
Injector.exe
-
Size
1.0MB
-
MD5
de2a595a1e0722b1f904a09d2f8c880f
-
SHA1
d9f308756095874a2529db21978129fdeab3ebdf
-
SHA256
fbe3d7b715be1c3921f954c92d2132184c82c07bab6c0fea97c5a7f80ce28973
-
SHA512
aa1c8e6dc4f9e3534f77e4789e8325e2f7a2afc26e2aeb64ea88eb14615a8e15bea3b088cdb299aefbf90fb449d578773fa860f33ebbebc1c0e83f524d748849
-
SSDEEP
24576:jzzT/BJN7m3E/6hR605i4rmOajEfw+Jwz/S/6yyFoBkkA8:fvBJN7GhRo4rcjCw+W7SCran
Malware Config
Signatures
-
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\system32\WDI\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\S-1-5-21-2539840389-1261165778-1087677076-1000_UserData.bin svchost.exe File opened for modification C:\Windows\system32\SRU\SRU.chk svchost.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF svchost.exe File created C:\Windows\system32\NDF\{B0FC6194-8883-451B-9843-F95A7F566504}-temp-07062024-1324.etl svchost.exe File opened for modification C:\Windows\system32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\{3378c58a-4b36-4dc3-a823-01f39232d636}\snapshot.etl svchost.exe File created C:\Windows\system32\wdi\{86432a0b-3c7d-4ddf-a89c-172faa90485d}\{3378c58a-4b36-4dc3-a823-01f39232d636}\snapshot.etl svchost.exe File opened for modification C:\Windows\system32\WDI\BootPerformanceDiagnostics_SystemData.bin svchost.exe File created C:\Windows\system32\wdi\LogFiles\StartupInfo\S-1-5-21-2539840389-1261165778-1087677076-1000_StartupInfo3.xml svchost.exe File opened for modification C:\Windows\system32\SRU\SRU.log svchost.exe File opened for modification C:\Windows\system32\SRU\SRUDB.dat svchost.exe File opened for modification C:\Windows\system32\SRU\SRUDB.jfm svchost.exe File opened for modification C:\Windows\system32\NDF\{B0FC6194-8883-451B-9843-F95A7F566504}-temp-07062024-1324.etl svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\rasphone.pbk svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 6680 ipconfig.exe -
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\RAS AutoDial svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\RAS AutoDial\Default svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\2a\E27DDEF7 svchost.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Classes\Local Settings\MuiCache\2a\E27DDEF7\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "Client HNetCfg" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133647458074769079" chrome.exe -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 1648 WINWORD.EXE 1648 WINWORD.EXE 5308 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 2020 msedge.exe 2020 msedge.exe 2888 identity_helper.exe 2888 identity_helper.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 7100 sdiagnhost.exe 7100 sdiagnhost.exe 6044 svchost.exe 6044 svchost.exe 4420 Injector.exe 4420 Injector.exe 712 chrome.exe 712 chrome.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 6044 svchost.exe 6044 svchost.exe 6436 chrome.exe 6436 chrome.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe 5380 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5308 vlc.exe 5380 taskmgr.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 1172 Process not Found 2964 Process not Found 5728 Process not Found 4400 Process not Found 5696 Process not Found 7020 Process not Found 5676 Process not Found 1560 Process not Found 7064 Process not Found 5124 Process not Found 5412 Process not Found 4284 Process not Found 3416 Process not Found 3696 Process not Found 5732 Process not Found 6664 Process not Found 5156 Process not Found 6816 Process not Found 7052 Process not Found 6680 Process not Found 7012 Process not Found 3160 Process not Found 3556 Process not Found 7008 Process not Found 2160 Process not Found 4900 Process not Found 6632 Process not Found 452 Process not Found 980 Process not Found 1848 Process not Found 4952 Process not Found 4132 Process not Found 1980 Process not Found 5432 Process not Found 4828 Process not Found 6968 Process not Found 6492 Process not Found 6416 Process not Found 6392 Process not Found 7136 Process not Found 1492 Process not Found 3512 Process not Found 5972 Process not Found 208 Process not Found 6272 Process not Found 4324 Process not Found 6104 Process not Found 3040 Process not Found 4152 Process not Found 4708 Process not Found 1440 Process not Found 2116 Process not Found 6892 Process not Found 6960 Process not Found 5460 Process not Found 5244 Process not Found 6336 Process not Found 3728 Process not Found 5488 Process not Found 1140 Process not Found 5480 Process not Found 2700 Process not Found 5456 Process not Found 7108 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 26 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 2020 msedge.exe 712 chrome.exe 712 chrome.exe 2020 msedge.exe 712 chrome.exe 2020 msedge.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 2020 msedge.exe 2020 msedge.exe 712 chrome.exe 2020 msedge.exe 2020 msedge.exe 712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeDebugPrivilege 7100 sdiagnhost.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeShutdownPrivilege 712 chrome.exe Token: SeCreatePagefilePrivilege 712 chrome.exe Token: SeDebugPrivilege 4420 Injector.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 5736 msdt.exe 5736 msdt.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 5308 vlc.exe 5308 vlc.exe 5308 vlc.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 712 chrome.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 2020 msedge.exe 5308 vlc.exe 5308 vlc.exe 5308 vlc.exe 5308 vlc.exe 5308 vlc.exe 5308 vlc.exe 5308 vlc.exe 5308 vlc.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1648 WINWORD.EXE 1648 WINWORD.EXE 1648 WINWORD.EXE 1648 WINWORD.EXE 1648 WINWORD.EXE 1648 WINWORD.EXE 1648 WINWORD.EXE 5308 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1768 2020 msedge.exe 87 PID 2020 wrote to memory of 1768 2020 msedge.exe 87 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 3548 2020 msedge.exe 88 PID 2020 wrote to memory of 1356 2020 msedge.exe 89 PID 2020 wrote to memory of 1356 2020 msedge.exe 89 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 PID 2020 wrote to memory of 2940 2020 msedge.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Injector.exe"C:\Users\Admin\AppData\Local\Temp\Injector.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/2ZFsuTsfeX2⤵PID:4032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae3b946f8,0x7ffae3b94708,0x7ffae3b947183⤵PID:6152
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae3b946f8,0x7ffae3b94708,0x7ffae3b947182⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4324 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4432 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --service-sandbox-type=none --mojo-platform-channel-handle=4600 /prefetch:82⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --service-sandbox-type=none --mojo-platform-channel-handle=4600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:12⤵PID:5528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:5256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:6308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:6516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --lang=fr --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,18225347931384944786,3757486380123061950,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2492
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffade36ab58,0x7ffade36ab68,0x7ffade36ab782⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:22⤵PID:3488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2344 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:82⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3028 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4324 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:5220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4452 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:5612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3960 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:5640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3516 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:5928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4232 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:82⤵PID:5996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4224 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:82⤵PID:6056
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:5352
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x25c,0x260,0x264,0x238,0x268,0x7ff6e7edae48,0x7ff6e7edae58,0x7ff6e7edae683⤵PID:5396
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3480 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4824 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:5800
-
-
C:\Windows\system32\msdt.exe-modal "66116" -skip TRUE -path "C:\Windows\diagnostics\system\networking" -af "C:\Users\Admin\AppData\Local\Temp\NDFE791.tmp" -ep "NetworkDiagnosticsWeb"2⤵
- Suspicious use of FindShellTrayWindow
PID:5736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3660 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:6408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4444 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:82⤵PID:6556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:82⤵PID:6564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3400 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:82⤵PID:6676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=1968 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=2800 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:12⤵PID:5256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 --field-trial-handle=1996,i,17482295240636594122,4022169119511750960,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6436
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3396
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:7100 -
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5932
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:6176
-
-
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all2⤵
- Gathers network information
PID:6680
-
-
C:\Windows\system32\ROUTE.EXE"C:\Windows\system32\ROUTE.EXE" print2⤵PID:2260
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddf2⤵PID:7032
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6000 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\winethc.dll",ForceProxyDetectionOnNextRun2⤵PID:6904
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost1⤵PID:5724
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:6944
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1648
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3852
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\CompleteSwitch.mp3"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5308
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:5380
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2936
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2980
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:5800
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4108
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2072
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:5572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD56d971ce11af4a6a93a4311841da1a178
SHA1cbfdbc9b184f340cbad764abc4d8a31b9c250176
SHA256338ddefb963d5042cae01de7b87ac40f4d78d1bfa2014ff774036f4bc7486783
SHA512c58b59b9677f70a5bb5efd0ecbf59d2ac21cbc52e661980241d3be33663825e2a7a77adafbcec195e1d9d89d05b9ccb5e5be1a201f92cb1c1f54c258af16e29f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5de29376b2a36cb80f4c3994f94d3bddf
SHA15b6617026eb64e99aac5793bfef84a452026cc26
SHA256efd6c91e553dd3f9c931640e807d47c86f46530bbd7719aa3b762ac48a83de26
SHA5126260cd686379d8c7150395771a2ad204e40bfeec891f3b30626620518dae034c97cb23dcb19c7b1fd10a1100fe1a0366d08ebbf2fe57a61369fc0250cfddc35c
-
Filesize
257KB
MD53d22a3408f6b17566c881d7b507d6ec8
SHA108eb3fbd7083db0818b2950b41f3e4e99f40150a
SHA256c32861acf778e12555bc13df25a28fce0d9066d989afa50cfdbe2dd7ba8db986
SHA512e01981b90249c51e390c4e2f400f0c261e5c747b9480416ff610e56a0218191dcbd1e4d9144972e2e25fdd2ebf91d412a609eb691f6758041bd76d4507c7008f
-
Filesize
257KB
MD5b5e748fa4afd9a2abf231ea947143926
SHA1203872d76205917e95d0b17cf70139d9b68e59d0
SHA2561d6430a318158a5b326f3eafdda4129d8b728f55c694eb1458a66e8f004550f2
SHA5127399106eb76a85c50cf3ed648fa8bf1254969691fbaf7485b1237f4db881df9e8145e4d8e473c3f2966f3517f3304b6b16e4e96c7ed34b99067da8be3eb0f680
-
Filesize
94KB
MD588a30e10980752b358e1536a15b2069c
SHA197276ad5894f2a5a600dd49e48f3967361edeb97
SHA256f7d9c73d84836e4066389f1fde2473f9a87e6006c232c664c30fcab3744a78e0
SHA512a7ff7e98fc9180f72171f2d6525af3001eab4c7e5a4ad6143f4666cb4fd75d1425f8a2e30eb983f6cb58b80d6fccff4fef2434f6366762d31cad9df7dc7edda3
-
Filesize
91KB
MD523092ffa4db36b3155e2f8af8da359ab
SHA16aedc4e22793ed86e77d50203658d0df4c0dffeb
SHA25652c0679247936b8d9113a34c452c1319c36834e52b12b84ca3f2b76f6c33d525
SHA512703b6f1c9e2a79f86a1f0adc10f291aa8f9d14e8cf1d2e3a90a0c3c1ddf3e3e250cab23caf8a7bd40f1c0d042f44452872e1c6e42cde542b0d50bf48eb7903f1
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
6KB
MD5fc4a8e8391227e9fe301cbbc5a817f1a
SHA1de36683dbc1cb8837c3b9c7c223ca70d1938e11f
SHA2567163103361ce663d15ee11058c8513b238592deb71dd54c82c2b73e933bb438e
SHA5122614190060ce72e8a2eb8fc4f4cca7d3b4a70bd0da4a16233fc70e8f669e6baacd44b2ecd7afbfb2b518e275a1de3486d2571e90ed749407157f5732c109491a
-
Filesize
6KB
MD5b2d088de795900a4039e1850c5eb105a
SHA1522da3949bb13ce90da8e521c67360523b2db83e
SHA2569a1e2eb661de0eed06e07db5866d7fd56600c1e74faf899147716dd5907b30e5
SHA512e59b84b2e2071a387b2029059854268ad639ecc025dea89b7baf447dde57d58645a580c84fdcbdd3eb283ccea4a5b7559cd85b64d9330b62751f00fc037059c1
-
Filesize
5KB
MD56bcf97be3aab095413dc45c2a3a42406
SHA10026a3c999af5445e1bb793a19ff8180e88f58c8
SHA2563649123603ecdcb208f5ac449d0106be57fe8272b02f691aabca7214636d5007
SHA5126505a89110c37b8ef13cfd2432bc7caa0ac7552f82a3c6ef2c8219d685b4df3c88fed29efd24d95a83dd132074627a6c0231d31104e6284568dbb99ac2f8d8ea
-
Filesize
6KB
MD5d7d897259a884e42d6f38255f7c67618
SHA157e3f9506c343b0ab234a1095ef0cfe09f40f207
SHA256c29201a516edcfd9c7f00ffe1ccccf67b7fe531ef3b64f554890ea8c736ef862
SHA512756243427cfcebf7bf02aeeab123e97a8bf8eb0f55529fff042915689fcd9c41a8f62ed366184cbb10bd5cb2817b0565b7587b5bff78a2ddcc2e7b3601995bc5
-
Filesize
6KB
MD54ccf2d381fdb5d22303fc9d6ff15a696
SHA194134ed026b04a8d8c991e96d5dad835cf33e3af
SHA2566b684fb14d025f044234fbe96612f3cc3872dbfaf410118cef4cc1ff9bd94df2
SHA512d0f88657a46f1678c31e2a4407337cb6a68f7a6b2682f064d1dc8676feb9de537490de54a4da51562c03b2e525a0c932de5290c472a073a7957862313ccc3b02
-
Filesize
6KB
MD53a545c5fe269ef1b9642eecb15f3e411
SHA1d30399af3e62b1999c3522a19492d9e38e2d12ea
SHA25682221b534fa4259e887b5edc3427e239f383aa2af986a7142127a52da84874f4
SHA512235182472e957dda1c851acb10d58d05f10442cc446d42d2b6dcb844e7c231da04dea942390fc0c003160dc519026aa3b9f526f9ee2b248ef8feb0092a762cff
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
9KB
MD5f623561eab4e1240f26fd289646ac503
SHA1439721468659404d9f17d2083a82fc498e4a4184
SHA2567df22c878cf68f3370c07c6986a16b91c1ced15c0f0f72fb4cacd795396f8150
SHA512fdab1c39157f78dfd304a1855350d3d5b0dde3cc567106942a5561db3e106450cb11488364ae549fdbd2b31a330f7d5820644d505d8da02376f819a7a270185b
-
Filesize
8KB
MD5bcec5d972577a0335f1e40f090fd1d08
SHA1d7374aa5c9b03faf7f51737bac5c8f89b3b6dccc
SHA256c5be0c6a5f8b503a86c5d4daed1db0f0a7a862ba3f1aad13f3c928a45128c66f
SHA512810ca3dbdfb9fe13b3c27a5f4391f0213c643f5e620e22fb6fd1ce7d8d85ea9c83932476b2c0b663f4d2d0a6244b0a0f73ca578c82f572ce9f046ddb2b185732
-
Filesize
8KB
MD5ddfb6f382b73e39073c57ef9e3010f08
SHA1fb39ecc29a6861e19650a15e1bc6c53d56bf3241
SHA25642f461c3b7411fb6d01c3f27dbf25e2c98c3f5811ece42ffe08150f5fe2933d9
SHA512d77136ce2d8793bd449743d9696d0e0ecfc84bd5b9a244247bd265a17de1f0fd590890dcc1783d4ba926003b7b785aa7c61cd36f857860ec821a610522a6dee9
-
Filesize
3KB
MD5e310e5578a38aa0803fe501af84e061d
SHA1ec4e52893b7da842778df8d6658b356de731249b
SHA256904b48d7f7c6f079ddf5453bfe05bd98118a7e69d0bba17a75f2209a7a5389bd
SHA51236465ac3ee139947b6623b0efc85cbf66dc8640dbb41abb613057b7d4b48e816bb67cc4893bd994f4f81d2978397f0a8361b2300eb5fb38cb0dcf01a546bceb2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5ac31f2a9ce380017999bf13d26a3d94b
SHA17334d99a8abd3eb30c1f8e8592ef4ae0084270c2
SHA256dd3c755194a37976254ac029eb7adf2c5551191ca81725184b2b2798305cc085
SHA512c22369d1928895ce330a0dd37543b84aec6cb2f6337aa6fe31f28a08d1b8777dc6a3eb1be950981a5a2c86aa5b2cfc58bfd29b1619b619ad6af16a855aca35e6
-
Filesize
231B
MD500848049d4218c485d9e9d7a54aa3b5f
SHA1d1d5f388221417985c365e8acaec127b971c40d0
SHA256ffeafbb8e7163fd7ec9abc029076796c73cd7b4eddaeeda9ba394c547419769e
SHA5123a4874a5289682e2b32108740feea586cb9ccdad9ca08bf30f67c9742370c081ad943ea714f08dbf722f9f98f3b0bb307619a8ba47f96b24301c68b0fd1086d9
-
Filesize
2KB
MD515c5c081c8309c35787724b0dd3c3408
SHA173b7b12154eb790f6074c91d4068a9189fd3b7b8
SHA256a29b6c342d34e9d954d781d8b5a5f6bfe0a7ecb2f29f4ecd3c38eab6eb362b88
SHA512092cb49bb4a6c0c6ec04805b5255e81c129e1c50076b6d36183f60f6439ad1bee8a4ad846a72d7525fbfa22676e696025b2690dec340031b409c833f16bb3f1f
-
Filesize
4KB
MD51d985def71efb9c9abc6d79aed8e3689
SHA1a87e61459c6ff1ed7e84d1e7e128bdd8738d0138
SHA256d9d1495c3318c67452dd910e3f8e4b85aab08e83e016d57a8aaa2507abdc07ed
SHA512d8a228cd476b63c7518b50d15336020c57cba5c1c41b20c8329a89a0146b0c881df7640cab6948b724b991dc86fa718a310a6d0939706a21b8bcb316809bc90b
-
Filesize
978B
MD5906d5a12ec4018c78b1bbf355eb9f16b
SHA18a2d327a786a0aca9a3c7c35080801821e6fa515
SHA256dbe1108cec8557169cd534c9cb2b0091b5c1068164290836362a76b69961d3e7
SHA5128698137ad033d6b79a682c1c5351d9679a31eda0ad621266a91b50e10e27c774d3a2c1f86cbdb49e0b992cf7bc0c8ead2c7e8d9834cd8bc200d61f811b88dbe6
-
Filesize
283B
MD5df29bc05628e359d92ca028d6ed5cf3a
SHA127591a29891d3013ba287f13b46b0c28109bd955
SHA2562b2077dd792172f5275fd42281c89a8014ce130ec4c5ef232a9f25a3caa45b45
SHA512f9dfa531355b9a54ed7c6f028cb7a389ee6aec4d3d20a38c49082683aaf46a3cb083a90dfabda5c10f3a63075f3201e081e86cf0e5bcc84bc96a40af702bc768
-
Filesize
202B
MD54566d1d70073cd75fe35acb78ff9d082
SHA1f602ecc057a3c19aa07671b34b4fdd662aa033cc
SHA256fe33f57205e2ebb981c4744d5a4ddc231f587a9a0589e6565c52e1051eadb0c0
SHA512b9584ebfdd25cc588162dd6525a399c72ac03bf0c61709b96a19feba7217d840ae2c60d7b0d3b43307a2776f497a388e79ef8a646c12ae59a7f5cc4789bbf3c8
-
Filesize
80B
MD594f954d1846db36be7a0885e33566daf
SHA10d0be6f33ec6c314022e6875078c848df5f09019
SHA256706df65f7095ae0f46c3e88edde1a0b5a8446dec7c019da2ba020a9dbe3b3d9c
SHA512e504ed105539be1cb5cbaac68ad603c2aa18d3d8736a4847a3236bfe76bbd9bc98118c941fd6f3ca21b6ec3876d44846f09696cc45439443070d8ff3a6a7bc46
-
Filesize
11KB
MD5d213491a2d74b38a9535d616b9161217
SHA1bde94742d1e769638e2de84dfb099f797adcc217
SHA2564662c3c94e0340a243c2a39ca8a88fd9f65c74fb197644a11d4ffcae6b191211
SHA5125fd8b91b27935711495934e5d7ca14f9dd72bc40a38072595879ef334a47f99e0608087ddc62668c6f783938d9f22a3688c5cdef3a9ad6c3575f3cfa5a3b0104
-
Filesize
25KB
MD5d0cfc204ca3968b891f7ce0dccfb2eda
SHA156dad1716554d8dc573d0ea391f808e7857b2206
SHA256e3940266b4368c04333db89804246cb89bf2073626f22b8de72bea27c522282a
SHA5124d2225b599ad8af8ba8516f12cfddca5ec0ce69c5c80b133a6a323e9aaf5e0312efbcfa54d2e4462a5095f9a7c42b9d5b39f3204e0be72c3b1992cf33b22087c
-
Filesize
10KB
MD59b222d8ec4b20860f10ebf303035b984
SHA1b30eea35c2516afcab2c49ef6531af94efaf7e1a
SHA256a32e13da40ac4b9e1dac7dd28bc1d25e2f2136b61ff93be943018b20796f15bc
SHA5128331337ccb6e3137b01aeec03e6921fd3b9e56c44fa1b17545ae5c7bfcdd39fcd8a90192884b3a82f56659009e24b63ce7f500e8766fd01e8d4e60a52de0fe67
-
Filesize
567B
MD5a660422059d953c6d681b53a6977100e
SHA10c95dd05514d062354c0eecc9ae8d437123305bb
SHA256d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813
SHA51226f8cf9ac95ff649ecc2ed349bc6c7c3a04b188594d5c3289af8f2768ab59672bc95ffefcc83ed3ffa44edd0afeb16a4c2490e633a89fce7965843674d94b523
-
Filesize
53KB
MD5c912faa190464ce7dec867464c35a8dc
SHA1d1c6482dad37720db6bdc594c4757914d1b1dd70
SHA2563891846307aa9e83bca66b13198455af72af45bf721a2fbd41840d47e2a91201
SHA5125c34352d36459fd8fcda5b459a2e48601a033af31d802a90ed82c443a5a346b9480880d30c64db7ad0e4a8c35b98c98f69eceedad72f2a70d9c6cca74dce826a
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD573ed6c3cfa1b4be760db0db774d80926
SHA125d2d10b1edb3acadc7b7c5c72fb23473a09dd09
SHA256f50167ea32927a71d4b83763d273ee3f6d42ac94ddaf8d54eae7d638a2e7161d
SHA5124f9ab143b0a2e1049c74dd5ce69f3ec9d85379f5ccc44eb5671d9fba750df15f1a93c1405dff9ee1f36c7018ca4bad03a824418c77fb2dc58f1731d6e24c1713
-
Filesize
478KB
MD5580dc3658fa3fe42c41c99c52a9ce6b0
SHA13c4be12c6e3679a6c2267f88363bbd0e6e00cac5
SHA2565b7aa413e4a64679c550c77e6599a1c940ee947cbdf77d310e142a07a237aad2
SHA51268c52cd7b762b8f5d2f546092ed9c4316924fa04bd3ab748ab99541a8b4e7d9aec70acf5c9594d1457ad3a2f207d0c189ec58421d4352ddbc7eae453324d13f2
-
Filesize
22KB
MD5b72f4c3997e117ddbc198f26c59e596d
SHA17fad03bed669cfeb0b3850ee02c6c8deaf621802
SHA25609acb34d4c8b4ac23d309b1c5a6bea53a0fee232e42bd3d3c9f1f7faa48b187e
SHA512a91cab20beb5860f7dc136f9616cf5f6af731114868c3c28b30e783d87a7fe6a7b8e1047da06fe7647a1a4bb635667eb063e72e20ea72cfe41977caff1101242
-
C:\Windows\Temp\SDIAG_e54ccd3f-a7fd-4ba1-9ab8-0457cce85fa2\result\B0FC6194-8883-451B-9843-F95A7F566504.Diagnose.Admin.0.etl
Filesize192KB
MD57a1d2b1083d7635f387780c3307f6e5a
SHA18b82c530efec9df7011f50d62d6fd75c77734385
SHA2566838d64bcf11b32298e4d8e571da7edee46f9e92903d39fea861dc73bbd6e090
SHA51202054aa1eae507a70c9fbbc81b1aeb9aec0dfe5f86510f8a6503ff28dd00e6d0d018bd6661cdb828d0b9e75e5d7d304a27d9dc3daf6aa2b991f5e33e57c51290