Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 12:31

General

  • Target

    Chrome-h.msi

  • Size

    119.4MB

  • MD5

    9c1d169523718e83ffc6383637051682

  • SHA1

    9dab4b018efb2da67cdb2597fcf43124ccb32094

  • SHA256

    ac5ac00d4c06180d6f1421fa94cda235e9510ae314d8243a2cf0c21cbcbc4750

  • SHA512

    0a9c8faaa0430bd0775db2f9bc03bc2f355e8f56e390c5e17ceb9e1baca5a1183882c6964247cc1ab36ceb348c6be456afd0469de41f7c5688b0cdcaa12734dd

  • SSDEEP

    3145728:2WyXrlu9nzxXaddV9KosQ0fon6RIUeROMvLSG8gtL0T:2WybluRal9Ko10A6+UeowLSGzL0T

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 19 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 2 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 17 IoCs
  • Executes dropped EXE 64 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Program crash 18 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Checks SCSI registry key(s) 3 TTPs 39 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 22 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Chrome-h.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4724
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding D4382AD0EC172FEC00948340D97BE807 C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Program Files (x86)\Chrome\ChromeSetup.exe
        "C:\Program Files (x86)\Chrome\ChromeSetup.exe"
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\GoogleUpdate.exe
          "C:\Program Files (x86)\Google\Temp\GUMF473.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={9F0C1F44-1C50-396A-483A-08DA4896FF0B}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"
          4⤵
          • Event Triggered Execution: Image File Execution Options Injection
          • Checks computer location settings
          • Drops file in Program Files directory
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1820
          • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
            "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:1652
          • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
            "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            PID:4936
            • C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:2980
            • C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:2724
            • C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe
              "C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies registry class
              PID:2028
          • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
            "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSI3NjUiLz48L2FwcD48L3JlcXVlc3Q-
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            PID:2912
          • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
            "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={9F0C1F44-1C50-396A-483A-08DA4896FF0B}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{CD646E0A-CE3D-4F67-9F82-6283E627193D}"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:3928
      • C:\Program Files (x86)\setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe
        "C:\Program Files (x86)\setup_Ir5swQ5DpeRNwxXBTQuvwewK.exe" /silent
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Program Files (x86)\Common Files\NSEC\NSec.exe
          "C:\Program Files (x86)\Common Files\NSEC\NSec.exe" -ip
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:4472
        • C:\Program Files (x86)\Common Files\NSEC\instrap.exe
          "C:\Program Files (x86)\Common Files\NSEC\instrap.exe"
          4⤵
          • Enumerates connected drives
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2028
          • C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe
            "C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe" -i
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:932
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3952
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding D0D9955D1F1647665321E125BC2E68AD
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2320
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:712
    • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
      "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4576
      • C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\129.0.6668.71_chrome_installer.exe
        "C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\129.0.6668.71_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\gui37C6.tmp"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4784
        • C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\CR_E8B30.tmp\setup.exe
          "C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\CR_E8B30.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\CR_E8B30.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\gui37C6.tmp"
          3⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Drops file in Program Files directory
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3040
          • C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\CR_E8B30.tmp\setup.exe
            "C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\CR_E8B30.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=129.0.6668.71 --initial-client-data=0x26c,0x270,0x274,0x248,0x278,0x7ff75c519628,0x7ff75c519634,0x7ff75c519640
            4⤵
            • Executes dropped EXE
            PID:4460
          • C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\CR_E8B30.tmp\setup.exe
            "C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\CR_E8B30.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
            4⤵
            • Executes dropped EXE
            PID:5820
            • C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\CR_E8B30.tmp\setup.exe
              "C:\Program Files (x86)\Google\Update\Install\{DC5FDB89-36E2-4905-8333-AEE0CD97A2AC}\CR_E8B30.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=129.0.6668.71 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7ff75c519628,0x7ff75c519634,0x7ff75c519640
              5⤵
              • Executes dropped EXE
              PID:5904
      • C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe
        "C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe"
        2⤵
        • Executes dropped EXE
        PID:5212
      • C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe
        "C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe"
        2⤵
        • Executes dropped EXE
        PID:5260
      • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
        "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgZG93bmxvYWRlcj0iYml0cyIgdXJsPSJodHRwOi8vZWRnZWRsLm1lLmd2dDEuY29tL2VkZ2VkbC9yZWxlYXNlMi9jaHJvbWUvam40NnFtY2R4NmdnZXd1czR2cjJscG5qdGVfMTI5LjAuNjY2OC43MS8xMjkuMC42NjY4LjcxX2Nocm9tZV9pbnN0YWxsZXIuZXhlIiBkb3dubG9hZGVkPSIxMTUwMzU1MTIiIHRvdGFsPSIxMTUwMzU1MTIiIGRvd25sb2FkX3RpbWVfbXM9IjgyNzYiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iNiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5NjcwNyIgc291cmNlX3VybF9pbmRleD0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjQyMiIgZG93bmxvYWRfdGltZV9tcz0iOTM4NiIgZG93bmxvYWRlZD0iMTE1MDM1NTEyIiB0b3RhbD0iMTE1MDM1NTEyIiBpbnN0YWxsX3RpbWVfbXM9IjMzOTg4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
        2⤵
        • Executes dropped EXE
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:5292
    • C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe
      "C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe" -r
      1⤵
      • Server Software Component: Terminal Services DLL
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2940
      • C:\Program Files (x86)\Common Files\NSEC\fixit.exe
        "C:\Program Files (x86)\Common Files\NSEC\fixit.exe" -df -flag=00000334
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:944
      • C:\Program Files (x86)\Common Files\NSEC\Plugins\wg\wg.exe
        "C:\Program Files (x86)\Common Files\NSEC\Plugins\wg\wg.exe" genkey
        2⤵
        • Executes dropped EXE
        PID:2976
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c cmd /c type "C:\Program Files (x86)\Common Files\NSEC\Data\netguard_privateKey.key" | "C:\Program Files (x86)\Common Files\NSEC\Plugins\wg\wg.exe" pubkey > "C:\Program Files (x86)\Common Files\NSEC\Data\netguard_publicKey.key"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c type "C:\Program Files (x86)\Common Files\NSEC\Data\netguard_privateKey.key"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4240
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\wg\wg.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\wg\wg.exe" pubkey
          3⤵
          • Executes dropped EXE
          PID:2244
      • C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe
        "C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe" -elevated
        2⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:4728
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:4844
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 1368
            4⤵
            • Program crash
            PID:5528
        • C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe
          "C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2264
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
          PowerShell "Get-AppxPackage | Select Name, Version,publisher, IsFramework,NonRemovable,installLocation,PackageFullName"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4292
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Executes dropped EXE
          PID:5748
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5748 -s 1000
            4⤵
            • Program crash
            PID:5392
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Executes dropped EXE
          PID:468
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 956
            4⤵
            • Program crash
            PID:5356
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 964
            4⤵
            • Program crash
            PID:4844
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:6108
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 6108 -s 956
            4⤵
            • Program crash
            PID:4652
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 6108 -s 972
            4⤵
            • Program crash
            PID:5792
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Executes dropped EXE
          PID:3604
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 956
            4⤵
            • Program crash
            PID:3744
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1124
            4⤵
            • Program crash
            PID:5772
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2808
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 992
            4⤵
            • Program crash
            PID:3604
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Executes dropped EXE
          PID:4312
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 980
            4⤵
            • Program crash
            PID:5728
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 988
            4⤵
            • Program crash
            PID:552
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3568
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 976
            4⤵
            • Program crash
            PID:4088
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 984
            4⤵
            • Program crash
            PID:3524
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Executes dropped EXE
          PID:5248
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5248 -s 964
            4⤵
            • Program crash
            PID:456
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5248 -s 976
            4⤵
            • Program crash
            PID:5772
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:5144
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5144 -s 960
            4⤵
            • Program crash
            PID:1620
        • C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe
          "C:\Program Files (x86)\Common Files\NSEC\Plugins\NSecUI\Nx.UI.MessageCenter.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4512
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 924
            4⤵
            • Program crash
            PID:5424
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 972
            4⤵
            • Program crash
            PID:388
      • C:\Program Files (x86)\Common Files\NSEC\NSecDs.exe
        "C:\Program Files (x86)\Common Files\NSEC\NSecDs.exe" /Service
        2⤵
        • Executes dropped EXE
        • Modifies registry class
        PID:3148
      • C:\Windows\SysWOW64\net.exe
        net start NSecDs
        2⤵
        • System Location Discovery: System Language Discovery
        PID:1652
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 start NSecDs
          3⤵
            PID:1276
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" "C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\NSecRTX2.exe"
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          PID:5164
        • C:\Windows\SysWOW64\net.exe
          net stop mswtd
          2⤵
          • System Location Discovery: System Language Discovery
          PID:5224
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop mswtd
            3⤵
              PID:5692
          • C:\Windows\SysWOW64\sc.exe
            sc delete mswtd
            2⤵
            • Launches sc.exe
            PID:5768
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\Microsoft Research\NSEC\NShellExt32.dll"
            2⤵
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:6092
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\Microsoft Research\NSEC\NShellExt64.dll"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:3940
            • C:\Windows\system32\regsvr32.exe
              /s "C:\Program Files (x86)\Microsoft Research\NSEC\NShellExt64.dll"
              3⤵
              • Modifies registry class
              PID:1496
          • C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe
            "C:\Program Files (x86)\Common Files\NSEC\NSecRTS.exe" -install_nfsflt_drivers
            2⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:5340
            • C:\Windows\system32\rundll32.exe
              C:\Windows\system32\rundll32.exe C:\Windows\system32\setupapi.dll,InstallHinfSection DefaultInstall 132 C:\Program Files (x86)\Common Files\NSEC\drivers\nfsflt\nFsFlt64.inf
              3⤵
              • Adds Run key to start application
              • Drops file in Windows directory
              PID:2996
              • C:\Windows\system32\runonce.exe
                "C:\Windows\system32\runonce.exe" -r
                4⤵
                • Checks processor information in registry
                • Modifies data under HKEY_USERS
                PID:6044
                • C:\Windows\System32\grpconv.exe
                  "C:\Windows\System32\grpconv.exe" -o
                  5⤵
                  • Modifies data under HKEY_USERS
                  PID:5556
          • C:\Windows\SysWOW64\net.exe
            net start NSecKrnl
            2⤵
              PID:3584
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start NSecKrnl
                3⤵
                  PID:5152
              • C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe
                "C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe" -i
                2⤵
                • Executes dropped EXE
                PID:5256
              • C:\Program Files (x86)\Common Files\NSEC\plugins\7z\7z.exe
                "C:\Program Files (x86)\Common Files\NSEC\\plugins\7z\7z.exe" x -y -aoa -o"C:\Program Files (x86)\Common Files\NSEC\plugins\aspnetcore-runtime" "C:\Program Files (x86)\Common Files\NSEC\plugins\aspnetcore-runtime.zip"
                2⤵
                • Drops file in Program Files directory
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • System Time Discovery
                PID:5804
              • C:\Windows\SysWOW64\net.exe
                net start NSecKrnl
                2⤵
                • System Location Discovery: System Language Discovery
                PID:5680
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start NSecKrnl
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:5356
              • C:\Windows\SysWOW64\net.exe
                net start nFsFlt
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3940
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start nFsFlt
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4652
              • C:\Windows\SysWOW64\net.exe
                net start nFsFlt
                2⤵
                • System Location Discovery: System Language Discovery
                PID:5252
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start nFsFlt
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3188
              • C:\Windows\SysWOW64\net.exe
                net start NSecKrnl
                2⤵
                • System Location Discovery: System Language Discovery
                PID:5988
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start NSecKrnl
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:5824
              • C:\Windows\SysWOW64\net.exe
                net start NSecKrnl
                2⤵
                • System Location Discovery: System Language Discovery
                PID:5520
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start NSecKrnl
                  3⤵
                    PID:5860
                • C:\Windows\SysWOW64\net.exe
                  net start nFsFlt
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:5676
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start nFsFlt
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:5764
                • C:\Windows\SysWOW64\net.exe
                  net start NSecKrnl
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3632
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start NSecKrnl
                    3⤵
                      PID:3416
                  • C:\Windows\SysWOW64\net.exe
                    net start nFsFlt
                    2⤵
                      PID:5564
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start nFsFlt
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:5692
                    • C:\Windows\SysWOW64\net.exe
                      net start nFsFlt
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:5900
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start nFsFlt
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:5968
                    • C:\Windows\SysWOW64\net.exe
                      net start NSecKrnl
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:5772
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start NSecKrnl
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:5384
                    • C:\Program Files (x86)\Common Files\NSEC\Plugins\7z\7z.exe
                      "C:\Program Files (x86)\Common Files\NSEC\Plugins\7z\7z.exe" x -y -aoa -o"C:\Program Files (x86)\Common Files\NSEC\res" "C:\Program Files (x86)\Common Files\NSEC\icon.zip"
                      2⤵
                      • Drops file in Program Files directory
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2060
                    • C:\Windows\SysWOW64\net.exe
                      net start NSecKrnl
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3028
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start NSecKrnl
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:1060
                    • C:\Windows\SysWOW64\net.exe
                      net start nFsFlt
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:4496
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start nFsFlt
                        3⤵
                          PID:5228
                      • C:\Windows\SysWOW64\net.exe
                        net start nFsFlt
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:5168
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 start nFsFlt
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2664
                      • C:\Windows\SysWOW64\net.exe
                        net start NSecKrnl
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:5228
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 start NSecKrnl
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:3820
                      • C:\Windows\SysWOW64\net.exe
                        net start NSecKrnl
                        2⤵
                          PID:5620
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 start NSecKrnl
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4496
                        • C:\Windows\SysWOW64\net.exe
                          net start nFsFlt
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:3508
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 start nFsFlt
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1588
                        • C:\Windows\SysWOW64\net.exe
                          net start NSecKrnl
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:4496
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 start NSecKrnl
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4512
                        • C:\Windows\SysWOW64\net.exe
                          net start nFsFlt
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:5652
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 start nFsFlt
                            3⤵
                              PID:5232
                          • C:\Windows\SysWOW64\net.exe
                            net start nFsFlt
                            2⤵
                              PID:6116
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 start nFsFlt
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:5412
                            • C:\Windows\SysWOW64\net.exe
                              net start NSecKrnl
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:4512
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 start NSecKrnl
                                3⤵
                                  PID:4848
                            • C:\Program Files (x86)\Common Files\NSEC\NSecDs.exe
                              "C:\Program Files (x86)\Common Files\NSEC\NSecDs.exe"
                              1⤵
                              • Executes dropped EXE
                              PID:764
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4844 -ip 4844
                              1⤵
                                PID:5140
                              • C:\Windows\SysWOW64\svchost.exe
                                C:\Windows\SysWOW64\svchost.exe -k NetworkServicePnp -s Mswtd
                                1⤵
                                  PID:6028
                                  • C:\Program Files (x86)\Microsoft Research\NSEC\Fixit.exe
                                    "C:\Program Files (x86)\Microsoft Research\NSEC\Fixit.exe" -dfx
                                    2⤵
                                    • Executes dropped EXE
                                    PID:6108
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
                                  1⤵
                                  • Drops file in Windows directory
                                  • Checks SCSI registry key(s)
                                  PID:4840
                                  • C:\Windows\system32\DrvInst.exe
                                    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{96ae6584-2d34-ff4f-9f34-654898ed6475}\nFsFlt64.inf" "9" "46249fc23" "0000000000000148" "WinSta0\Default" "0000000000000160" "208" "C:\Program Files (x86)\Common Files\NSEC\drivers\nfsflt"
                                    2⤵
                                    • Drops file in System32 directory
                                    • Drops file in Windows directory
                                    • Checks SCSI registry key(s)
                                    • Modifies data under HKEY_USERS
                                    PID:5580
                                  • C:\Windows\system32\DrvInst.exe
                                    DrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\nfsflt64.inf_amd64_3d4483f1b65ddfb3\nfsflt64.inf" "0" "46249fc23" "0000000000000160" "WinSta0\Default"
                                    2⤵
                                    • Drops file in Drivers directory
                                    • Drops file in System32 directory
                                    • Drops file in Windows directory
                                    PID:5916
                                • C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe
                                  "C:\Program Files (x86)\Common Files\NSEC\x64\NSecRTS.exe" -r
                                  1⤵
                                  • Executes dropped EXE
                                  • Checks SCSI registry key(s)
                                  PID:5140
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5748 -ip 5748
                                  1⤵
                                    PID:5224
                                  • C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\NSecRTX2.exe
                                    "C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\NSecRTX2.exe"
                                    1⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:5380
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 468 -ip 468
                                    1⤵
                                      PID:5948
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 468 -ip 468
                                      1⤵
                                        PID:4468
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 6108 -ip 6108
                                        1⤵
                                          PID:5356
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 6108 -ip 6108
                                          1⤵
                                            PID:6140
                                          • C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe
                                            "C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe" -Embedding
                                            1⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:5288
                                            • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                                              "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ondemand
                                              2⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:5180
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer
                                                3⤵
                                                • Checks computer location settings
                                                • Checks system information in the registry
                                                • Executes dropped EXE
                                                • Enumerates system info in registry
                                                • Modifies data under HKEY_USERS
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                • Suspicious use of SetWindowsHookEx
                                                PID:3552
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=129.0.6668.71 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffed0497bf8,0x7ffed0497c04,0x7ffed0497c10
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:5600
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2100,i,9922220856136230113,10803259145482920619,262144 --variations-seed-version --mojo-platform-channel-handle=2096 /prefetch:2
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:5852
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=2324,i,9922220856136230113,10803259145482920619,262144 --variations-seed-version --mojo-platform-channel-handle=2356 /prefetch:3
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:6000
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --field-trial-handle=2488,i,9922220856136230113,10803259145482920619,262144 --variations-seed-version --mojo-platform-channel-handle=2504 /prefetch:8
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:5096
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3340,i,9922220856136230113,10803259145482920619,262144 --variations-seed-version --mojo-platform-channel-handle=3380 /prefetch:1
                                                  4⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  PID:4644
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3348,i,9922220856136230113,10803259145482920619,262144 --variations-seed-version --mojo-platform-channel-handle=3416 /prefetch:1
                                                  4⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  PID:2236
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4632,i,9922220856136230113,10803259145482920619,262144 --variations-seed-version --mojo-platform-channel-handle=4672 /prefetch:1
                                                  4⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  PID:5324
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4972,i,9922220856136230113,10803259145482920619,262144 --variations-seed-version --mojo-platform-channel-handle=4980 /prefetch:1
                                                  4⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  PID:3760
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=4988,i,9922220856136230113,10803259145482920619,262144 --variations-seed-version --mojo-platform-channel-handle=5148 /prefetch:8
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:5912
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5140,i,9922220856136230113,10803259145482920619,262144 --variations-seed-version --mojo-platform-channel-handle=5264 /prefetch:8
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:5980
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5532,i,9922220856136230113,10803259145482920619,262144 --variations-seed-version --mojo-platform-channel-handle=5540 /prefetch:8
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:2812
                                          • C:\Program Files\Google\Chrome\Application\129.0.6668.71\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\129.0.6668.71\elevation_service.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            PID:2764
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                            1⤵
                                              PID:2792
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3604 -ip 3604
                                              1⤵
                                                PID:3956
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3604 -ip 3604
                                                1⤵
                                                  PID:3212
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2808 -ip 2808
                                                  1⤵
                                                    PID:5292
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4312 -ip 4312
                                                    1⤵
                                                      PID:4184
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4312 -ip 4312
                                                      1⤵
                                                        PID:6116
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3568 -ip 3568
                                                        1⤵
                                                          PID:5564
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3568 -ip 3568
                                                          1⤵
                                                            PID:2808
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5248 -ip 5248
                                                            1⤵
                                                              PID:2060
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 5248 -ip 5248
                                                              1⤵
                                                                PID:5620
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 5144 -ip 5144
                                                                1⤵
                                                                  PID:5064
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4512 -ip 4512
                                                                  1⤵
                                                                    PID:2072
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4512 -ip 4512
                                                                    1⤵
                                                                      PID:4416

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Config.Msi\e57ebd8.rbs

                                                                      Filesize

                                                                      8KB

                                                                      MD5

                                                                      2c91d565e199c3259b21ed7b5e587374

                                                                      SHA1

                                                                      c4c7147435f5f34cca19295714b892121d4c8061

                                                                      SHA256

                                                                      2e5765388df68d320c09ed802347ba089452c61a9325a3f12104a4910e0a7cff

                                                                      SHA512

                                                                      e0671cd05ca883513f4e52bca9773f7470703902eb39fa2d5c4addb1e73a2012b0022035296cbccc28f18488569cc8a8a89a17c8e91b7b7b86e6247f02ee1089

                                                                    • C:\NSec\Debug\Log\NSecRTS.exe-system_2024-09-29.log

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      3d8d65389b700113a370355a7fb6cafb

                                                                      SHA1

                                                                      88ec646f332007564c9edc3a342c29aac31766ef

                                                                      SHA256

                                                                      62a7397df388f956816e62d46d5a4a381297ae82f0264bde265c8b88a71e3c97

                                                                      SHA512

                                                                      c82b211951aa5c703fc02c2b1437f6a9a81d3aa0243c2b8f5761e3efa58a684ff5b7bfa2cfedb76f68a92461c69907bea261d0add7bcb19ee03ca707ab1d0a82

                                                                    • C:\NSec\Debug\Log\NSecRTS.exe-system_2024-09-29.log

                                                                      Filesize

                                                                      3KB

                                                                      MD5

                                                                      c231c900ba2c08df2c06aad1cda00cc1

                                                                      SHA1

                                                                      3c3143b7a889c09daaa17f29dd1f789a4ca6dea4

                                                                      SHA256

                                                                      9eccf2892216b8b056f5aff3879c600cec4ffb1b968966c6a11a1c1ce4659fb3

                                                                      SHA512

                                                                      c6ac5b665ec31b7be45bb60e2210f093db8ce481b73f4c4e9d4415329100659094a9bd2c0eca93354f1dee166f43fa2b8212ac4ddcd5df35e3ceda983cfe0455

                                                                    • C:\NSec\Debug\Log\NSecRTS.exe-system_2024-09-29.log

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      1a4ac498759df786d83f8bc158ecef44

                                                                      SHA1

                                                                      55329c750caf4fcece807fb018aa0017333e4cb5

                                                                      SHA256

                                                                      5299bec0a3787e871fd0280ea28142e28b9d43c7c9cc63abc5ee3418778098bc

                                                                      SHA512

                                                                      3da9a8639cb5018e906ad240ed41fe55f0124970945221257816cb9e53ebbc5dca4cc54d5f37fde6d0f56e9f13f126325f1fe50652baf02578c026b0faae1121

                                                                    • C:\NSec\Debug\Log\NSecRTS.exe-user_2024-09-29.log

                                                                      Filesize

                                                                      4KB

                                                                      MD5

                                                                      ab4024085e9eace4d82cceaebc94cd98

                                                                      SHA1

                                                                      40258b5fb3f4f7a68ff51333f9cad4866191c5a3

                                                                      SHA256

                                                                      7be3bd18bdb4702fc431b3b57bfe11090d265c6a23932db3c3d8fce41778dde4

                                                                      SHA512

                                                                      6741756b7a5f5081091413e2ff75e61744c5a2bb8c5cfff87f0868cade16e10b6f8b081ea52fe8daee5530429d102004d74cb1b082a3f15aa058e9fcd0f4fa46

                                                                    • C:\NSec\cache.ini

                                                                      Filesize

                                                                      42B

                                                                      MD5

                                                                      3187af40c98d1161419c1da5842485d4

                                                                      SHA1

                                                                      c8c3feeacf65e73fee11ebeb9c3a251e7cbeb25a

                                                                      SHA256

                                                                      43ae52819df22a92aa8e0d68fac55142213a1735000d5cf0d01b72f416bd058f

                                                                      SHA512

                                                                      f602242d252ba571cebd18b0fc86dd7937fecdd4f4d362be4e10e6d4021a7ae5898e33751a08e614c9304c48d12ada98ce09565134809dcd8daf37fe204752e6

                                                                    • C:\Program Files (x86)\Chrome\ChromeSetup.exe

                                                                      Filesize

                                                                      1.3MB

                                                                      MD5

                                                                      4a94844260d6a08828d781d488cef61d

                                                                      SHA1

                                                                      de8169fdb5ab8a120df577d92eb25a2767431738

                                                                      SHA256

                                                                      46d7a8abe3bb9d7302529246cd8ee6e7d0360d1045fe92662cc7580e72ef5132

                                                                      SHA512

                                                                      82549c1e525a90003fb0174ebba2bc3b4f58706ef9fd5e6ee07d489ab536ef286e408db6c15a52b039d3f59c09bd55e35d045def79007da5d414d5d589d34f4f

                                                                    • C:\Program Files (x86)\Common Files\NSEC\data\cfg.xml

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      e36b1fc16f266432c6f981de8b6485ce

                                                                      SHA1

                                                                      32c2eb3655604f9c47db2cafa12603396f96a0d4

                                                                      SHA256

                                                                      d431234d11ed6026e818db43f4f705428892bb410cd6d96f13f8b9771fe115bf

                                                                      SHA512

                                                                      45b0da960b1b0f7394919df02e05de212940d7d74af8798192cc538d6b90d93c8db068b16f1eac1b0d4a528c90bfdaddbf8a74ad3124173e64c693164decbb4b

                                                                    • C:\Program Files (x86)\Common Files\NSEC\data\xConfig.db

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      a55796e7908d6bb80e9c4fc3af2fca75

                                                                      SHA1

                                                                      b12895b09745a8e56b2322903e562329139ee445

                                                                      SHA256

                                                                      a7b6b2d8d86da704b3f702699c7edb685dbafa9ea1b33d5acadc38a84c66ec9b

                                                                      SHA512

                                                                      491cbb94f275b88c0f68cd30466c74432885df618e4c22765d1888f43ef6c52e990d8d502a8df8d00b209a9a9495cd52d783425e19902c24ee872220c2451f31

                                                                    • C:\Program Files (x86)\Common Files\NSEC\data\xConfig.db

                                                                      Filesize

                                                                      12KB

                                                                      MD5

                                                                      870794c55108682c90ce08c93bd43faa

                                                                      SHA1

                                                                      470e1399bd76306033c8c63a4064b3fde776a405

                                                                      SHA256

                                                                      32fbdab66bf3c728e9d2048c7c1d2e225d77512b3fb1bb6d115c7a72ea79ff35

                                                                      SHA512

                                                                      e7db07c1980a0b5ea657917064fa31f24d81b1955e8ef91c65264d4df0ac7b7cb81dc45b5de600f5fb60f55a0275ec34a2e372140bec2a4f21f218ee0af00c45

                                                                    • C:\Program Files (x86)\Common Files\NSEC\plugins\NSecUI\NSecsoft.NativeModule.dll

                                                                      Filesize

                                                                      2.9MB

                                                                      MD5

                                                                      deb2bb69ceb270527d79a73fd3a2cc85

                                                                      SHA1

                                                                      8a9d82ca0038e6e26261648b19227430244a8f67

                                                                      SHA256

                                                                      f390d67535f1a915b55fd501e7c228cfc0513236d1380fa2e69760eb49be84c1

                                                                      SHA512

                                                                      05f9ed9637c0a2ad9c2f2b6cadb43c61c3fb0b0b3e89df55daa43b229cce84602c1800c6da338bdea58e7e7498042ed9c4aec41eed2303c2dacda113e59c4b98

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\GoogleCrashHandler.exe

                                                                      Filesize

                                                                      294KB

                                                                      MD5

                                                                      a11ce10ac47f5f83b9bc980567331a1b

                                                                      SHA1

                                                                      63ee42e347b0328f8d71a3aa4dde4c6dc46da726

                                                                      SHA256

                                                                      101dbf984c4b3876defe2699d6160acbf1bb3f213e02a32f08fdcdc06821c542

                                                                      SHA512

                                                                      ff2f86c4061188ead1bfeebd36de7dbc312adcc95267537697f2bfcbb0c53e7c4ab0cd268cef22f0182391796c4612c97cbdc1266d9ee1960cdd2610d8c2bcb3

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\GoogleCrashHandler64.exe

                                                                      Filesize

                                                                      392KB

                                                                      MD5

                                                                      b659663611a4c2216dff5ab1b60dd089

                                                                      SHA1

                                                                      9a14392a5bdb9ea6b8c3e60224b7ff37091d48b5

                                                                      SHA256

                                                                      cad4aa1cf58f6b2e2aceb789d53b18418e67066ec406b2fac786cb845ef89d2b

                                                                      SHA512

                                                                      1065f9072cd6f1f4364f1354108f2647ee1d89f87e908a22fcd63bd3149c864c457e62268067a439d0486d8d4aa150aa984ad8ac8b51cae49014b67b80496040

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\GoogleUpdate.exe

                                                                      Filesize

                                                                      158KB

                                                                      MD5

                                                                      cdf152e23a8cbf68dbe3f419701244fc

                                                                      SHA1

                                                                      cb850d3675da418131d90ab01320e4e8842228d7

                                                                      SHA256

                                                                      84eaf43f33d95da9ab310fc36dc3cfe53823d2220946f021f18cf3f729b8d64e

                                                                      SHA512

                                                                      863e1da5bc779fa02cf08587c4de5f04c56e02902c5c4f92a06f2e631380ecabcc98e35d52609f764727e41b965c0786d24ea23fc4b9776d24d9f13e0d8ae0c2

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\GoogleUpdateComRegisterShell64.exe

                                                                      Filesize

                                                                      181KB

                                                                      MD5

                                                                      be535d8b68dd064442f73211466e5987

                                                                      SHA1

                                                                      aa49313d9513fd9c2d2b25da09ea24d09cc03435

                                                                      SHA256

                                                                      c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59

                                                                      SHA512

                                                                      eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\GoogleUpdateCore.exe

                                                                      Filesize

                                                                      217KB

                                                                      MD5

                                                                      af51ea4d9828e21f72e935b0deae50f2

                                                                      SHA1

                                                                      c7fe57c2a16c9f5a5ebdd3cc0910427cba5308bd

                                                                      SHA256

                                                                      3575011873d0f6d49c783095dae06e6619f8f5463da578fbe284ca5d1d449619

                                                                      SHA512

                                                                      ec9828d0bade39754748fb53cfc7efdc5e57955198bac3c248ea9b5a9a607182bb1477819f220549a8e9eadbe6bf69a12da6c8af3761980d2dd9078eaeaa932f

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdate.dll

                                                                      Filesize

                                                                      1.9MB

                                                                      MD5

                                                                      dae72b4b8bcf62780d63b9cbb5b36b35

                                                                      SHA1

                                                                      1d9b764661cfe4ee0f0388ff75fd0f6866a9cd89

                                                                      SHA256

                                                                      b0ca6700e7a4ea667d91bcf3338699f28649c2e0a3c0d8b4f2d146ab7c843ab6

                                                                      SHA512

                                                                      402c00cab6dac8981e200b6b8b4263038d76afe47c473d5f2abf0406222b32fff727b495c6b754d207af2778288203ce0774a6200b3e580e90299d08ce0c098f

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_am.dll

                                                                      Filesize

                                                                      42KB

                                                                      MD5

                                                                      849bc7e364e30f8ee4c157f50d5b695e

                                                                      SHA1

                                                                      b52b8efa1f3a2c84f436f328decd2912efeb1b18

                                                                      SHA256

                                                                      f1384a25a6f40e861455c62190d794415f3e9bfca6317c214847e9535dfc3fb9

                                                                      SHA512

                                                                      6fd7f542a7073b3bbf1b0c200bb306b30f1b35a64a1fb013f25c7df76f63ef377d9bd736e8da2e9372f1c994785eaeedb6b60e3a0d4a4e8734c266ad61782d3b

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_ar.dll

                                                                      Filesize

                                                                      41KB

                                                                      MD5

                                                                      163695df53cea0728f9f58a46a08e102

                                                                      SHA1

                                                                      71b39eec83260e2ccc299fac165414acb46958bd

                                                                      SHA256

                                                                      f89dddda3e887385b42ea88118ba8fb1cc68fde0c07d44b851164564eb7c1ec8

                                                                      SHA512

                                                                      6dfb70a175097f3c96ae815a563c185136cb5a35f361288cc81570facfa1f1d28f49eaa61172d1da4982ebb76bd3e32c4de77cf97dedfb79f18113d7594d0989

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_bg.dll

                                                                      Filesize

                                                                      44KB

                                                                      MD5

                                                                      c523ec13643d74b187b26b410d39569b

                                                                      SHA1

                                                                      46aff0297036c60f22ad30d4e58f429890d9e09d

                                                                      SHA256

                                                                      80505863866bcd93a7e617dd8160531401d6d05f48d595348cd321cf7d97aeac

                                                                      SHA512

                                                                      ecf98e29a3481b05ab23c3ff89fa3caf054b874ed15462a5e33022aacf561d8fea4a0de35cc5f7450f62110ca4ace613e0c67f543ad22eb417e79eb3ebf24ed7

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_bn.dll

                                                                      Filesize

                                                                      44KB

                                                                      MD5

                                                                      dafa45a82ce30cf2fd621e0a0b8c031f

                                                                      SHA1

                                                                      e39ed5213f9bb02d9da2c889425fab8ca6978db7

                                                                      SHA256

                                                                      d58e5f0fa894123de1d9b687a5b84826e095eca128ee5df8870f2db74f4233a2

                                                                      SHA512

                                                                      2b772ebc128eb59d636eec36583329962ead8e0a399fd56394b1244486bf815f4e033ceef74a62a9930ab2bf6ec1ba5e2d3c942183f7cb2355a716a3e2c6c7a1

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_ca.dll

                                                                      Filesize

                                                                      44KB

                                                                      MD5

                                                                      39e25ba8d69f493e6f18c4ef0cf96de8

                                                                      SHA1

                                                                      5584a94a85d83514a46030c4165e8f7a942e63e2

                                                                      SHA256

                                                                      1f66ebdcaae482a201a6e0fab9c1f4501c23a0d4ad819ccd555fdca9cc7edb94

                                                                      SHA512

                                                                      773c995b449d64e36eb8cab174db29e29e29985bcfd714799d6b05b01bb7d4a0fc2aefaf2e27ff02b0e105fbe0d34d7efe29b193a1bc3365ec47e1f1003bed26

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_cs.dll

                                                                      Filesize

                                                                      43KB

                                                                      MD5

                                                                      b9033db8d0e5bf254979b0f47d10e93d

                                                                      SHA1

                                                                      2859de0d851b5f4fd3056e8f9015cece2436c307

                                                                      SHA256

                                                                      12c41c2f472b6a05fd6392e9d4f8aeb9a40840c2cbefd68b39d20f9d1d4d77ed

                                                                      SHA512

                                                                      52075df4ae5c86ebb0bac20604ea072a163761ae058c1473211bf4bb0eeed043cfc5a92386f876b53484cdf4e3f8a7b75d8f4bf9894c24f8c22ec23a50b70b7c

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_da.dll

                                                                      Filesize

                                                                      43KB

                                                                      MD5

                                                                      9f2e018a4f9a1d278983d0b677b91218

                                                                      SHA1

                                                                      c58ee1fc0d8ef9d99f85426b48c7f28f381a2c17

                                                                      SHA256

                                                                      d0dcdc68236eecd6b5f0b437eb92b8935741dabf1fa276a552399815af22edec

                                                                      SHA512

                                                                      20b74b6a9f81527d4a5fe30671d2559261fb682576f4ab04da7856280fbbaeb6af83894009c9d7cb83deeae988d0ac5ec7ec32b277b7eb45829faec2857d7014

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_de.dll

                                                                      Filesize

                                                                      45KB

                                                                      MD5

                                                                      96d92500b9a763f4b862c511c17e0a47

                                                                      SHA1

                                                                      2fd441eb8685d15e14fa6405e82359adea3e7148

                                                                      SHA256

                                                                      58829d135ff41e574ed5fc5e0421e4aa204267b02ca3ffaf08d8efb0a70fdd4c

                                                                      SHA512

                                                                      a1014584f1f278160d579848fa188f627676aee819e9395517490b00e273db6f583d7ddd31af6e35c9d251021df7fb26c88512aaa1c865c2ee3ba60c0a2db49a

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_el.dll

                                                                      Filesize

                                                                      44KB

                                                                      MD5

                                                                      ecdd26049573614b6f41d8a102ffcf21

                                                                      SHA1

                                                                      5140c6cff5d596267a64df1559ac36c4e8f49e42

                                                                      SHA256

                                                                      a3377520f2a95b8cc06bd30e493962c07f97eebf4661a69d03efb36b2ca515c5

                                                                      SHA512

                                                                      933c181d7575f20480c8deadac3f3e9190081456169122216c72e7b9a04aa75612140fc37697098c7c20b77001a67966fa1661cdc9110c40634c944f833a65b1

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_en-GB.dll

                                                                      Filesize

                                                                      42KB

                                                                      MD5

                                                                      f82ccf890c3ae14bfd7a263d07276e60

                                                                      SHA1

                                                                      6a915d6eb8c99d065e36a721d721d556b74bb377

                                                                      SHA256

                                                                      6b07a4fd3039541e30c68a8c31c371cda2cea480787f95e0ddbca3cc2fbff0cc

                                                                      SHA512

                                                                      4cbf9e6728e08de8d61f34b17bb20d92b6a699969edb9afa013fe962c8fd39238288adcd826134c9bca459904d8574a804c519daac6b301e0d38f68722c0359e

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_en.dll

                                                                      Filesize

                                                                      42KB

                                                                      MD5

                                                                      741211652c66a8a6790396e1875eefa9

                                                                      SHA1

                                                                      2ccd5653b5fc78bcc19f86b493cef11844ba7a0c

                                                                      SHA256

                                                                      e0945deacdb6b75ff2587dea975774b9b800747e2ee3f3917e5b40ddb87eda10

                                                                      SHA512

                                                                      b70f847d8ca8828c89bbb67b543950fbd514c733cf62b52ad7fc0dab7b2168fe56d1f21bef3210f5c7f563f72831455d870a5f9aa6c557f1e3543ef7329c42f9

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_es-419.dll

                                                                      Filesize

                                                                      43KB

                                                                      MD5

                                                                      1c0b1c3625c9ccace1b23e0c64095ee9

                                                                      SHA1

                                                                      3904a80d016e0a9a267c0b5feb8e6747b44b5fa1

                                                                      SHA256

                                                                      f030757e1911e9efde0d74a02c22694fa5ef139f73897a7f97acab9da05f7c8b

                                                                      SHA512

                                                                      0a988edef8d67cd83c2be65cbfa07059df311732ee92ad73fb9411d7cf7d853a2b8d2ab801733d05ab6afaccab33a2684117bbc1d80b362b677cc53ae9de42f0

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_es.dll

                                                                      Filesize

                                                                      45KB

                                                                      MD5

                                                                      dae64d49ee97339b7327b52c9f720848

                                                                      SHA1

                                                                      15f159c4808f9e4fe6a2f1a4a19faa5d84ac630b

                                                                      SHA256

                                                                      e76400e62ae0ab31565e50b05d1001b775a91aa487a54dc90e53c0e103c717c2

                                                                      SHA512

                                                                      9ae72e5a658aa0e1fb261d62ccef474cd42d9bec2b4a50f71925d131ffea22b8f60fb961772587ce71cb30a32da3b7986e7483ecea960a509e0450d3983c84b0

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_et.dll

                                                                      Filesize

                                                                      42KB

                                                                      MD5

                                                                      dfa1d51ca956e3aaa1008503aaeb3dd8

                                                                      SHA1

                                                                      94511faf996c1ce9b2397c7fc3f78f32fbf8f966

                                                                      SHA256

                                                                      3781d18bab1524cff8104167caaccb7eee6614394068dbb7b7c412c7c9b5aae9

                                                                      SHA512

                                                                      b25f9a14053acab26f1d353e9d908cbe769a640d0e8d66c30209c2a5d76c503b8e7fb04651f37ff482f7c4df4ffed33013d37b1f7bb6650e25447006f447b85d

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_fa.dll

                                                                      Filesize

                                                                      42KB

                                                                      MD5

                                                                      90d38d6669931e76faa1e69aee2ab3e2

                                                                      SHA1

                                                                      e0de420b422c7ad4e73ace2c84db45f6db2b1d6e

                                                                      SHA256

                                                                      1fe4bc690efc72cb8737d4b451c2c843d2987d71bf60723471bf66cf53fcc714

                                                                      SHA512

                                                                      1cc66e166b4dc3b6c1f96340489652bd313d8d6de31a3165bac9da8fd42146843f840ee7a5f163512163fc8f90b865a06cc29a147c44389f40eb1edafd6d3743

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_fi.dll

                                                                      Filesize

                                                                      43KB

                                                                      MD5

                                                                      5c530468d61708123c8919a8480e5967

                                                                      SHA1

                                                                      2d85a2335bc688d2c2045299c1e36b39b179603e

                                                                      SHA256

                                                                      21aa3b8d540c7b2ea33c4a11fb35fdd721b69f04a660edb2ac2031d98f38e239

                                                                      SHA512

                                                                      bfe4ce4762ef5de853635a2341249012da27b7a02e3f4722841792345527d7951fb20661d1b7c8a58293c4ac5ee0b34cea0e190fa5f74efd12aeacba3c74a2aa

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_fil.dll

                                                                      Filesize

                                                                      44KB

                                                                      MD5

                                                                      7be40d81658abf5ad064b1d2b47bab85

                                                                      SHA1

                                                                      6275af886533320522a8aa5d56c1ce96bd951e50

                                                                      SHA256

                                                                      a063ef2570a5ae5f43284ca29cf5b9723cdc5a013b7ee7743c1f35b21b4d6de3

                                                                      SHA512

                                                                      fb9ebefdc2bd895c06971abef0ab1d3e7483c2e38b564881a723c38e39be1dc4e7ab6996e1d6fbe2ca5864909002342afc0a478eaa660ef18c891dc164e56153

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_fr.dll

                                                                      Filesize

                                                                      44KB

                                                                      MD5

                                                                      463f8ddab25348ea0897ead89146402f

                                                                      SHA1

                                                                      a0f160a05139ad95c066ebdac738789a796229c5

                                                                      SHA256

                                                                      737210fd8e9a4c601693d0e9c95a323881d125b02f9f82b0a3820ca223b29af6

                                                                      SHA512

                                                                      e40e59d8dca80b9860359feb464933e1c9644f8d57ff5a9fdff6e598b1805ee6b0c1757cef68f9c9bb330dc3cce0fd285f22764cd2f6007d0ea42c792e61d262

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_gu.dll

                                                                      Filesize

                                                                      44KB

                                                                      MD5

                                                                      bab8d0e0de3cce8c6bb37f0ad0c32998

                                                                      SHA1

                                                                      8e874d3fa8964445af18edd2261c29d32fce949a

                                                                      SHA256

                                                                      68f33b5cc51cc5acacfb4b8e2501f2f15f586ba8d355773f941bf3818f4d0456

                                                                      SHA512

                                                                      f71f2d5c657cd934521a14c9b0a4807a3b8635d4bef0ced77f095a3a71eb1963cbbe7cbba5acf34b8fecba0413f608b30fe250df893d2c42a07214d7308f1897

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_hi.dll

                                                                      Filesize

                                                                      43KB

                                                                      MD5

                                                                      c49920211ea0dbcf0e345fca094d861a

                                                                      SHA1

                                                                      07280830e9dbe42cb92987432ec16b5811710582

                                                                      SHA256

                                                                      20c2df074927fd7e2fc62f346e0b4fb55823a3d4d531f861bf50de96ac64d092

                                                                      SHA512

                                                                      ae6a6b0df91d95cf7a510aa1195ce1da89f06245cae427ca7b5a72874bffd81d03c2fdd01c9ef478e303a9741ea5aa38c8b6f2f136652798aa531569916d3bf2

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_hr.dll

                                                                      Filesize

                                                                      43KB

                                                                      MD5

                                                                      2716da909b0391389cbe63c4ac400a57

                                                                      SHA1

                                                                      bd393b5d1628dc5f3c4a5f97442841dfffe82201

                                                                      SHA256

                                                                      e211322d446dbe1c37696583be70a6b4b60536b60e7a188d7f3e186b72e5c438

                                                                      SHA512

                                                                      84d495de33a70bce97a1ceaab229656089d8b615e649b39ce43a400fc91d0d62637987a0425b6fa573870c3e6ae3bbc9b1f7e7777bb20479d54f514f9a5763ed

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_hu.dll

                                                                      Filesize

                                                                      43KB

                                                                      MD5

                                                                      643d812265c32ef08d24ad85a4e96865

                                                                      SHA1

                                                                      3c576de29d0aff8b727856e16b0aefca81f9fd83

                                                                      SHA256

                                                                      8a9fb1677b9ff34a15dae299bdffdb1a2eb2d31d18c8f424b00a8779d2c2a7ce

                                                                      SHA512

                                                                      57c9acf0710f10f5d1478603ce47506a2147722c639366ef0b0330be7d278fc0fd2089a7d49e5a514d524c37bb282e8c9c8cd2290da6df7d741228e32645de32

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_id.dll

                                                                      Filesize

                                                                      42KB

                                                                      MD5

                                                                      ee84269990052544e742980dbaf0d83f

                                                                      SHA1

                                                                      52aa93d2a7143429e8af23aa82d02d08f82c53a4

                                                                      SHA256

                                                                      9f6e7f7eb54e9016536f99c0b4be8860957d89083a40f571e28fade5dd7b74fd

                                                                      SHA512

                                                                      4d2e5cc0d395d645b8134a71b10cab84c74a8058c0d45db4d45ce6e72153fedfb752ef0c0262eb28966d1dd2065cc59bc5aa86643736216eedb4a1bff60e710f

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_is.dll

                                                                      Filesize

                                                                      42KB

                                                                      MD5

                                                                      60356f1cf81af2df4f1249e44746e6c7

                                                                      SHA1

                                                                      2ef6d5a8fc130f2f64b462f3570ba7ca2251bb22

                                                                      SHA256

                                                                      e1370b54a0d8c228d7a0db25126c73a0952ef627c156eb6c694528f661bd80ae

                                                                      SHA512

                                                                      8ca6febf031afa634e1f67ed23fafc7140705a919193fb7179fd915a0d5a9ae8cff507c737831cface640ba228180f37a360080952a1a7874995103cd2c90f40

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_it.dll

                                                                      Filesize

                                                                      44KB

                                                                      MD5

                                                                      09a9fc2170493a2a41d170a50ba8bca1

                                                                      SHA1

                                                                      d16655f4ed41dd6c237c7a656fac5a1d701d3fb9

                                                                      SHA256

                                                                      ac69dc0d86be68b99092e88cdaa9790a7a8696508826ee203d5cb3b4a5d70127

                                                                      SHA512

                                                                      296e5a7789efb04197235c32c50c082069dd0c73e7a006a7564a8e5dfeac752e0be0061638755f878a533c567654506391f788ebfbe35b2abd5af7301503718c

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_iw.dll

                                                                      Filesize

                                                                      40KB

                                                                      MD5

                                                                      7ffd5276481f3f5fef9f1d9dac8497e1

                                                                      SHA1

                                                                      70a395091cd2bd4daa577d5d9d3f0adfef913d5c

                                                                      SHA256

                                                                      fd0d2ce2649f568572136d2fb05166d2ea359f09a144d74d18d7af300747ff74

                                                                      SHA512

                                                                      da5849817f2d36aff69508fcb8cc2876e2e3f4488b78ba31a88220ccd4f733cd3a9f7ebdeda3a0bc71b59e2046cce468e6feaf804f14df228bc72ab0ead7d9cd

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_ja.dll

                                                                      Filesize

                                                                      39KB

                                                                      MD5

                                                                      9da8d2e3d88263cd7f812d11ab9bc2c9

                                                                      SHA1

                                                                      dbcdc83da62cc4e017887b7bf922a0bbc84c2725

                                                                      SHA256

                                                                      bb48d17f2ba1a12cf8fc36261e0127331c0335576989135e6a26f39b06370a72

                                                                      SHA512

                                                                      1f9890057feee22dddfdfda15d70b28021091648b5709641cf24219b8fba47327ac73c47ebdf5dd3d7d78e4d0191174c5eebc6374c9ba97fddc2d0655d195561

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_kn.dll

                                                                      Filesize

                                                                      44KB

                                                                      MD5

                                                                      3dc995da466a474a48eafa898fb82358

                                                                      SHA1

                                                                      b77da19778316cc5a08271d34843454010d9f00a

                                                                      SHA256

                                                                      f90ed49e60496ae9c2a14916730571266429879a2fe1e573ce124b23a431cc24

                                                                      SHA512

                                                                      b818f076ba0711bd84a584b360eba7134393d056403a0b001e594937b613e9b0bc6f68eb592f0206f461c95f0c50db0f182d7e6d1dba0fc0653326410ef579d4

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_ko.dll

                                                                      Filesize

                                                                      38KB

                                                                      MD5

                                                                      817334b58dbb927ce4c48c3a3020951c

                                                                      SHA1

                                                                      3a6cf01fec1df2539c6120d22c09ed60d7e2cbff

                                                                      SHA256

                                                                      d3cef44dccba742ca5436958c084fc493cd466f025d6d16bdb672fcf2caca1a4

                                                                      SHA512

                                                                      f966388939746ebbe4c9cf39c20a8afd629197e8bb1c7901cc1566de2eb9cfafa600eb4c3a383bfdaba17bd231137a440c1ed15dc3dcd6fca31318547d3ef3d5

                                                                    • C:\Program Files (x86)\Google\Temp\GUMF473.tmp\goopdateres_zh-CN.dll

                                                                      Filesize

                                                                      37KB

                                                                      MD5

                                                                      ca52cc49599bb6bda28c38aea1f9ec4e

                                                                      SHA1

                                                                      494f166b530444f39bca27e2b9e10f27e34fc98a

                                                                      SHA256

                                                                      f9f144aa2dc0de21b24c93f498a9b4a946b7da42819a776b3283a0bcae18544b

                                                                      SHA512

                                                                      05e2d5711eef8f57737b2512de2e73744f17e0a34de0bfd2a06c9cc60a08ebadbafe38e30b66a2ede7fa61d5b9571adddcfbd7e1cafcee1ab2168a563d2d3f0d

                                                                    • C:\Program Files\Google\Chrome\Application\129.0.6668.71\Installer\setup.exe

                                                                      Filesize

                                                                      5.8MB

                                                                      MD5

                                                                      3c7d6cf5c75726853202c4f439a6dcc8

                                                                      SHA1

                                                                      3bad7aa503b9cf7ae1b058c87c845da082af6a64

                                                                      SHA256

                                                                      99de5f19bde5c8a33731d5556bcc41f92911becb3ab231bc6e30dd53a2af1579

                                                                      SHA512

                                                                      38a6b7e2696978f2d2d4d9f73da695fdc0ae7d2d499a5b4a4db8e0f90df821862737db77a3acc08f3f0e5a667e7a9b2e735e1e4d61cc54e0e4efad775047e993

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                      Filesize

                                                                      649B

                                                                      MD5

                                                                      541ea43102750357f4808cb63e8153b1

                                                                      SHA1

                                                                      75053dda3d2319471fd595888a98f13a3a9e0237

                                                                      SHA256

                                                                      f8bcd41390d7d28dd487a4109aacc76ec4e4792c1933ad898fa130b4bd3fc61d

                                                                      SHA512

                                                                      3886712c12e2d7016efea9773eff35a8a3c99bc3d2b6145e0be58224f79f1e389eccf8cc992d14fe46f23e4987851b0f3c278e56e206c80d5486b25c688246b4

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Google Profile.ico

                                                                      Filesize

                                                                      192KB

                                                                      MD5

                                                                      505a174e740b3c0e7065c45a78b5cf42

                                                                      SHA1

                                                                      38911944f14a8b5717245c8e6bd1d48e58c7df12

                                                                      SHA256

                                                                      024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d

                                                                      SHA512

                                                                      7891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      fedb95399f87d184d59f2e5c5ee63e13

                                                                      SHA1

                                                                      0cce0311826f5aef1bfdeef651be583cb8dcbc8c

                                                                      SHA256

                                                                      a91fea53344a77cceb8b7bce131a530fad1b951a180b3359475cb5d530128be4

                                                                      SHA512

                                                                      48bb08a7044d8490f3e7a598678f20c3b1790aa3a7760acfa49b0208140a7947caa0ade352fd2c19a00b04d21072416700b961f37156502dbd8522f655e8f3bc

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                      Filesize

                                                                      356B

                                                                      MD5

                                                                      cfdcc718bbc5f272c785c0b3857d4fa9

                                                                      SHA1

                                                                      5763072208c15713b1c1beb044196c4e6964874c

                                                                      SHA256

                                                                      9414b83589ba3034cc0a6d8412f5369ebc25f712cf6fc67a5400faba1c23ac1b

                                                                      SHA512

                                                                      ee6848127141d3e0c1b334f8550ba698ed3e743a8a2f13938ec13635ecdff928b5fb65054a7d207e66e57fbc608b024175f31b4d6613a87ac8632b07e7d261c9

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\db5bdd68-87ff-49d4-aba6-014f616f874b.tmp

                                                                      Filesize

                                                                      2B

                                                                      MD5

                                                                      d751713988987e9331980363e24189ce

                                                                      SHA1

                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                      SHA256

                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                      SHA512

                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                      Filesize

                                                                      10KB

                                                                      MD5

                                                                      1d87d48755e704f0403d4ed2cdda0d45

                                                                      SHA1

                                                                      0a32423b923979aa1830b5a2ab76271802a9ec13

                                                                      SHA256

                                                                      7f267a414340d377f8dbca1c571be600d0599b900a17412a09ea1fdb40fcebe4

                                                                      SHA512

                                                                      fd6a3fe70094a8628d2774d593cb4e1b9da2d316977b5e09b7d72c743831da41db7c47dd02766372f32d7153a6de4e2ad7bc04c5f0b06ea60ec9c83a44103565

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                      Filesize

                                                                      15KB

                                                                      MD5

                                                                      29f01f9d757ae8761c9582f00e985edc

                                                                      SHA1

                                                                      af4d1c5dbd22ceeaeaae3451b1aa269b04f559c9

                                                                      SHA256

                                                                      7228af67e44f47d8f37e78f9bc24d2ad40e6ed838d1f1638c81e4549a1937bc2

                                                                      SHA512

                                                                      90d8442dc032641018208e758e2da393ded606017c13ecced438753335eea4ebd4dff7a04f4b0e80b26375836c843ffb0ef1cae9eceee9172c20db51ffa7c085

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\trusted_vault.pb

                                                                      Filesize

                                                                      38B

                                                                      MD5

                                                                      3433ccf3e03fc35b634cd0627833b0ad

                                                                      SHA1

                                                                      789a43382e88905d6eb739ada3a8ba8c479ede02

                                                                      SHA256

                                                                      f7d5893372edaa08377cb270a99842a9c758b447b7b57c52a7b1158c0c202e6d

                                                                      SHA512

                                                                      21a29f0ef89fec310701dcad191ea4ab670edc0fc161496f7542f707b5b9ce619eb8b709a52073052b0f705d657e03a45be7560c80909e92ae7d5939ce688e9c

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      100KB

                                                                      MD5

                                                                      64faa560e0da3fd4c6a3a038d79f9287

                                                                      SHA1

                                                                      380078500da8eb99026f757809306e0f855e6e3e

                                                                      SHA256

                                                                      d9e62eb259fe2c1c82efa76fee53c0b7ff3c4b37e42224559a974904146f5618

                                                                      SHA512

                                                                      185bcf3f02a0ab08dc95e9e4b08d40e4d20950e14b313aec35c705560f4199701e4bc3878e189604b15b5d11cb019501ebd85860b5cdd66e0fedbb889a005627

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      9c147cd0b283f94111c418c0a1fcbfe1

                                                                      SHA1

                                                                      bbe48a35cc8131786a05d4df0e0951a75ad2af8b

                                                                      SHA256

                                                                      15d9245748ce2c091f2a9080a636a9e7eb6826587e49d15a22923cbacaf592db

                                                                      SHA512

                                                                      af61a18aa1a8a196a7becf45b5818d1e400afa081396299f04d8ac70fc1f2cc2d2c7dd2bc657d0e402e7bac156e9bb3968c5b93047287a7df5094268fa6cf426

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      99KB

                                                                      MD5

                                                                      87cf7d22b7dd261d866fb48caf07b292

                                                                      SHA1

                                                                      47376c7d7f4c6c032c2399a40ac767474e80d198

                                                                      SHA256

                                                                      185b6d1810683390a4e3d39b6cf2de4a1fc0d0698c6337fb8132f88acc6ba307

                                                                      SHA512

                                                                      09d329d67a41b17b83884129f6ccf25f3a9b16cb9823056f7ec2828f4d466d7f62b912edf3dc76d38e01de510b098d070b8accce62dc0438038cce3dc9240412

                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                      Filesize

                                                                      184KB

                                                                      MD5

                                                                      23cc6ac264d30606406f2aeb5c863bfd

                                                                      SHA1

                                                                      b6c4a62b33f38f4681456975e04a328eaf4d1c17

                                                                      SHA256

                                                                      82219443ded3a88cc3800338da240a2daf2077beac0e26ae1b4b455a45327eae

                                                                      SHA512

                                                                      3a694a821087ddc8b9b77b8c787ce42096a15f7567229a7e7fb188c8ddf8a8220de289c0270186f38a8f8fd9c20cf52e00abe1279c842ba08b4cac48f2608cfd

                                                                    • C:\Users\Admin\AppData\Local\Temp\MSI9B17.tmp

                                                                      Filesize

                                                                      587KB

                                                                      MD5

                                                                      c7fbd5ee98e32a77edf1156db3fca622

                                                                      SHA1

                                                                      3e534fc55882e9fb940c9ae81e6f8a92a07125a0

                                                                      SHA256

                                                                      e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6

                                                                      SHA512

                                                                      8691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a

                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_k5ucm10n.40c.ps1

                                                                      Filesize

                                                                      60B

                                                                      MD5

                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                      SHA1

                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                      SHA256

                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                      SHA512

                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                    • C:\Users\Admin\AppData\Local\Temp\nsx3D93.tmp\nsExec.dll

                                                                      Filesize

                                                                      7KB

                                                                      MD5

                                                                      675c4948e1efc929edcabfe67148eddd

                                                                      SHA1

                                                                      f5bdd2c4329ed2732ecfe3423c3cc482606eb28e

                                                                      SHA256

                                                                      1076ca39c449ed1a968021b76ef31f22a5692dfafeea29460e8d970a63c59906

                                                                      SHA512

                                                                      61737021f86f54279d0a4e35db0d0808e9a55d89784a31d597f2e4b65b7bbeec99aa6c79d65258259130eeda2e5b2820f4f1247777a3010f2dc53e30c612a683

                                                                    • C:\Windows\System32\DriverStore\Temp\{5942db6b-105c-b84f-aefd-55246bbd1500}\SET6387.tmp

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      4df787b4beec3da203a67d629674b025

                                                                      SHA1

                                                                      fe7af6a2de7fcfb81fb718a33e94f64ad289f7fd

                                                                      SHA256

                                                                      cb978f621689b1b0e6aebe3f1728470503bf68a59439be8d79f082efda216aa4

                                                                      SHA512

                                                                      95080fd300cfb65dba8142714f302345f1a3a5f6804da3a5abf891f54c8a1555baa69af341d66271ccfda2ccc99008592521f1442cb075689a3ff8b669425fdc

                                                                    • C:\Windows\System32\DriverStore\Temp\{5942db6b-105c-b84f-aefd-55246bbd1500}\SET63A8.tmp

                                                                      Filesize

                                                                      2KB

                                                                      MD5

                                                                      0450b840f9c38eb58fc61cb4c8626e56

                                                                      SHA1

                                                                      ec1bf7dfd0fb8c1f1222b6f95555ef79ac29f631

                                                                      SHA256

                                                                      4f337f37944a9299a74aefc505a1d67338fca24b3f76620ce734f96f0976bdc4

                                                                      SHA512

                                                                      030da19c6ef8d5a2d4024befc1fed98971a89b9a68e83309d8ef95bf2cb3cba3e908cb1f1c7a85a2bcb8634dfe879cd6e2145b2810030eb620ccf26ae7cae89b

                                                                    • C:\Windows\System32\DriverStore\Temp\{5942db6b-105c-b84f-aefd-55246bbd1500}\SET63A9.tmp

                                                                      Filesize

                                                                      31KB

                                                                      MD5

                                                                      15d431631740012f3d1b25fcfbdc8688

                                                                      SHA1

                                                                      22c57e19481cd067f26c0ec0c1088172d9cb9cdc

                                                                      SHA256

                                                                      fe2b075a379d5319d2636cddc8ef4197610d2c8e24ed2c079c89af0fe9515aa1

                                                                      SHA512

                                                                      e44e96ee7201c003404d76b2b21bbc7f327e7c83757897c6b06c2c5ac98c1385d4fcea3da46bb2ed95abdb14880fcba68471f1b6731d3d62440e3156a4d1076e

                                                                    • memory/2808-3065-0x000000006D420000-0x000000006D430000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/3568-3348-0x000000006D420000-0x000000006D430000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/3604-2909-0x000000006D420000-0x000000006D430000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/3928-1248-0x000000006D430000-0x000000006D440000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/3928-1247-0x000000006D420000-0x000000006D430000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/3928-1244-0x000000006D430000-0x000000006D440000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4292-1419-0x00000000078B0000-0x00000000078C6000-memory.dmp

                                                                      Filesize

                                                                      88KB

                                                                    • memory/4292-1359-0x000000006C7F0000-0x000000006C800000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4292-1417-0x0000000007E80000-0x00000000084FA000-memory.dmp

                                                                      Filesize

                                                                      6.5MB

                                                                    • memory/4292-1300-0x0000000005260000-0x0000000005282000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/4292-1243-0x0000000004DC0000-0x0000000004DF6000-memory.dmp

                                                                      Filesize

                                                                      216KB

                                                                    • memory/4292-1271-0x0000000005430000-0x0000000005A58000-memory.dmp

                                                                      Filesize

                                                                      6.2MB

                                                                    • memory/4292-1353-0x0000000006340000-0x000000000635E000-memory.dmp

                                                                      Filesize

                                                                      120KB

                                                                    • memory/4292-1358-0x000000006C800000-0x000000006C810000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4292-1360-0x000000006C800000-0x000000006C810000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4292-1301-0x0000000005300000-0x0000000005366000-memory.dmp

                                                                      Filesize

                                                                      408KB

                                                                    • memory/4292-1302-0x0000000005370000-0x00000000053D6000-memory.dmp

                                                                      Filesize

                                                                      408KB

                                                                    • memory/4292-1451-0x0000000007AA0000-0x0000000007AC6000-memory.dmp

                                                                      Filesize

                                                                      152KB

                                                                    • memory/4292-1399-0x0000000007660000-0x0000000007692000-memory.dmp

                                                                      Filesize

                                                                      200KB

                                                                    • memory/4292-1400-0x0000000074A50000-0x0000000074A9C000-memory.dmp

                                                                      Filesize

                                                                      304KB

                                                                    • memory/4292-1410-0x0000000007640000-0x000000000765E000-memory.dmp

                                                                      Filesize

                                                                      120KB

                                                                    • memory/4292-1411-0x00000000076B0000-0x0000000007753000-memory.dmp

                                                                      Filesize

                                                                      652KB

                                                                    • memory/4292-1441-0x0000000007650000-0x000000000765A000-memory.dmp

                                                                      Filesize

                                                                      40KB

                                                                    • memory/4312-3197-0x000000006D420000-0x000000006D430000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4844-1172-0x0000000005140000-0x0000000005154000-memory.dmp

                                                                      Filesize

                                                                      80KB

                                                                    • memory/4844-1170-0x0000000005170000-0x0000000005202000-memory.dmp

                                                                      Filesize

                                                                      584KB

                                                                    • memory/4844-1165-0x00000000003E0000-0x00000000003FC000-memory.dmp

                                                                      Filesize

                                                                      112KB

                                                                    • memory/4844-1166-0x0000000005230000-0x00000000057D4000-memory.dmp

                                                                      Filesize

                                                                      5.6MB

                                                                    • memory/4844-1167-0x0000000004BD0000-0x0000000004BEA000-memory.dmp

                                                                      Filesize

                                                                      104KB

                                                                    • memory/4844-1169-0x0000000005D00000-0x0000000006212000-memory.dmp

                                                                      Filesize

                                                                      5.1MB

                                                                    • memory/4844-1237-0x000000006C490000-0x000000006C4A0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4844-1168-0x0000000006BF0000-0x0000000007FF4000-memory.dmp

                                                                      Filesize

                                                                      20.0MB

                                                                    • memory/4844-1412-0x0000000009080000-0x00000000093C6000-memory.dmp

                                                                      Filesize

                                                                      3.3MB

                                                                    • memory/4844-1171-0x00000000095A0000-0x000000000AB32000-memory.dmp

                                                                      Filesize

                                                                      21.6MB

                                                                    • memory/4844-1173-0x0000000005820000-0x0000000005856000-memory.dmp

                                                                      Filesize

                                                                      216KB

                                                                    • memory/4844-1178-0x00000000058D0000-0x0000000005936000-memory.dmp

                                                                      Filesize

                                                                      408KB

                                                                    • memory/4844-1239-0x000000006C490000-0x000000006C4A0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4844-1238-0x000000006C480000-0x000000006C490000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4844-1223-0x0000000006260000-0x000000000629C000-memory.dmp

                                                                      Filesize

                                                                      240KB

                                                                    • memory/4844-1224-0x0000000006220000-0x0000000006241000-memory.dmp

                                                                      Filesize

                                                                      132KB

                                                                    • memory/4844-1179-0x0000000005960000-0x0000000005CB4000-memory.dmp

                                                                      Filesize

                                                                      3.3MB

                                                                    • memory/4844-1180-0x0000000005860000-0x00000000058AC000-memory.dmp

                                                                      Filesize

                                                                      304KB

                                                                    • memory/5164-1338-0x0000000001990000-0x000000000199C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/5164-1333-0x0000000000960000-0x000000000096C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/5164-1364-0x0000000004030000-0x000000000406C000-memory.dmp

                                                                      Filesize

                                                                      240KB

                                                                    • memory/5164-1363-0x0000000003F20000-0x0000000003F32000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/5164-1348-0x0000000003E90000-0x0000000003EB2000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/5164-1334-0x0000000001820000-0x000000000183A000-memory.dmp

                                                                      Filesize

                                                                      104KB

                                                                    • memory/5380-3018-0x00000000043E0000-0x0000000004734000-memory.dmp

                                                                      Filesize

                                                                      3.3MB

                                                                    • memory/5380-2462-0x0000000003CE0000-0x0000000003D04000-memory.dmp

                                                                      Filesize

                                                                      144KB

                                                                    • memory/5380-3017-0x0000000004330000-0x00000000043E0000-memory.dmp

                                                                      Filesize

                                                                      704KB

                                                                    • memory/5380-2460-0x0000000003660000-0x000000000366C000-memory.dmp

                                                                      Filesize

                                                                      48KB

                                                                    • memory/5820-1513-0x00007FFEB0DD0000-0x00007FFEB0DE0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/5820-1512-0x00007FFEB0DC0000-0x00007FFEB0DD0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/5820-1511-0x00007FFEB0DD0000-0x00007FFEB0DE0000-memory.dmp

                                                                      Filesize

                                                                      64KB