Analysis
-
max time kernel
392s -
max time network
411s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-01-2025 22:04
Static task
static1
Behavioral task
behavioral1
Sample
VMware-viclient-f0c1e456.exe
Resource
win11-20241007-en
General
-
Target
VMware-viclient-f0c1e456.exe
-
Size
352.6MB
-
MD5
4d038eee3d8223801b558874c2661717
-
SHA1
ff34e99ce2d3e194e7cdc9e1df437cbba336b36e
-
SHA256
1e383a0e7990c73ea2856ee1d0204f99728cd58f0b30a288e12081dc7cb3a8f1
-
SHA512
e9a897b2157ad8e67e48ffb28faac68e85dbd8307a308eda66b9b0b80d483ec70190895dc25981aa87f7b35160508bd6dcf432c58d26831b8b4993e1d69b1a81
-
SSDEEP
6291456:j0wIKbeufOczho93esOsFbIqh9dBL8r93/hgWa08ZSphZVzXVMZXGRAJSzhTOpFh:j2KbeoDhxsOfeR8r93HatQ/VLVMZXG27
Malware Config
Extracted
meshagent
2
traffic-vc
http://162.254.38.170:443/agent.ashx
-
mesh_id
0xFA311D2F83B841F08B8AB48F5D2CE6C29D8454B1E03156158A557D0009BCFD55B4BC47EE76E7098D348EEAB8BF2114FC
-
server_id
14EDFD5700E9A14A8208348E4EFFE657FCAC524B4D43E6E5C4368E57344CD6EAB8EEE832B1FF53E8D20D44AACFE918CE
-
wss
wss://162.254.38.170:443/agent.ashx
Signatures
-
Detects MeshAgent payload 1 IoCs
resource yara_rule behavioral1/files/0x001c00000002aa51-4.dat family_meshagent -
Meshagent family
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\hcmon.sys vnetlib64.exe File opened for modification C:\Windows\system32\drivers\hcmon.sys vnetlib64.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Mesh Agent\ImagePath = "\"C:\\Program Files\\Mesh Agent\\MeshAgent.exe\" " agent_out.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 13 IoCs
pid Process 4584 agent_out.exe 2004 MeshAgent.exe 2204 software.exe 1904 VMware-viclient.exe 1288 vcredist_x86.exe 4084 install.exe 1204 vcredist_x64.exe 1208 install.exe 3200 vjredist64.exe 4364 install.exe 4852 vnetlib64.exe 3544 vnetlib64.exe 1400 vnetlib64.exe -
Loads dropped DLL 64 IoCs
pid Process 408 MsiExec.exe 408 MsiExec.exe 408 MsiExec.exe 408 MsiExec.exe 408 MsiExec.exe 408 MsiExec.exe 408 MsiExec.exe 408 MsiExec.exe 4084 install.exe 1208 install.exe 408 MsiExec.exe 4364 install.exe 1712 MsiExec.exe 1008 MsiExec.exe 1712 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1712 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe 1008 MsiExec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vjredist64.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 15 3212 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini MsiExec.exe File opened for modification C:\Windows\assembly\Desktop.ini MsiExec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: MSIEXEC.EXE File opened (read-only) \??\K: MSIEXEC.EXE File opened (read-only) \??\S: MSIEXEC.EXE File opened (read-only) \??\W: MSIEXEC.EXE File opened (read-only) \??\X: MSIEXEC.EXE File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: MSIEXEC.EXE File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: MSIEXEC.EXE File opened (read-only) \??\V: MSIEXEC.EXE File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: MSIEXEC.EXE File opened (read-only) \??\R: MSIEXEC.EXE File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\P: MSIEXEC.EXE File opened (read-only) \??\Y: MSIEXEC.EXE File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: MSIEXEC.EXE File opened (read-only) \??\J: MSIEXEC.EXE File opened (read-only) \??\T: MSIEXEC.EXE File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: MSIEXEC.EXE File opened (read-only) \??\H: MSIEXEC.EXE File opened (read-only) \??\L: MSIEXEC.EXE File opened (read-only) \??\O: MSIEXEC.EXE File opened (read-only) \??\U: MSIEXEC.EXE File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\A: MSIEXEC.EXE File opened (read-only) \??\G: MSIEXEC.EXE File opened (read-only) \??\M: MSIEXEC.EXE File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{e66f603f-4483-0f4a-9465-2349690303cb}\SET56E1.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmusb.inf_amd64_aeb12e4f8fbff559\vmusb.cat DrvInst.exe File opened for modification C:\Windows\System32\symbols\dll\ucrtbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\win32u.pdb MeshAgent.exe File opened for modification C:\Windows\System32\shell32.pdb MeshAgent.exe File created C:\Windows\SysWOW64\msvcp71.dll msiexec.exe File opened for modification C:\Windows\System32\kernel32.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys MeshAgent.exe File opened for modification C:\Windows\System32\DLL\iphlpapi.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\D51242473009F9555AFDA05A9BA0E4013499E83A MeshAgent.exe File created C:\Windows\SysWOW64\mfc71u.dll msiexec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e66f603f-4483-0f4a-9465-2349690303cb}\vmusb.cat DrvInst.exe File opened for modification C:\Windows\System32\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\gdi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ole32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\dbghelp.pdb MeshAgent.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\user32.pdb MeshAgent.exe File created C:\Windows\System32\DriverStore\Temp\{e66f603f-4483-0f4a-9465-2349690303cb}\SET56D1.tmp DrvInst.exe File opened for modification C:\Windows\System32\symbols\dll\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\gdi32.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\A677F586FD9587261964BB43C72ED3DF186C995B MeshAgent.exe File opened for modification C:\Windows\System32\dll\shcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\msvcrt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\combase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\Kernel.Appcore.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e66f603f-4483-0f4a-9465-2349690303cb} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{e66f603f-4483-0f4a-9465-2349690303cb}\SET56E2.tmp DrvInst.exe File opened for modification C:\Windows\System32\symbols\DLL\dbgcore.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\0FE279A8C0C37773D35A768336FFA92772FE5DE2 MeshAgent.exe File opened for modification C:\Windows\System32\dll\ntdll.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\kernelbase.pdb MeshAgent.exe File opened for modification C:\Windows\System32\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e66f603f-4483-0f4a-9465-2349690303cb}\vmusb.inf DrvInst.exe File opened for modification C:\Windows\System32\dll\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\gdi32full.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DLL\bcrypt.pdb MeshAgent.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\0FE279A8C0C37773D35A768336FFA92772FE5DE2 MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\advapi32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\gdiplus.pdb MeshAgent.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\MeshService64.pdb MeshAgent.exe File opened for modification C:\Windows\System32\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\msvcp_win.pdb MeshAgent.exe File opened for modification C:\Windows\System32\bcrypt.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e66f603f-4483-0f4a-9465-2349690303cb}\SET56E2.tmp DrvInst.exe File opened for modification C:\Windows\System32\rpcrt4.pdb MeshAgent.exe File opened for modification C:\Windows\System32\gdi32full.pdb MeshAgent.exe File created C:\Windows\SysWOW64\msvcr71.dll msiexec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e66f603f-4483-0f4a-9465-2349690303cb}\SET56D1.tmp DrvInst.exe File opened for modification C:\Windows\System32\dll\apphelp.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ws2_32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\user32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmusb.inf_amd64_aeb12e4f8fbff559\vmusb.inf DrvInst.exe File opened for modification C:\Windows\System32\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\9C7FD82D9F028E67151F7A1CD5DDDF8A25550C81 MeshAgent.exe File opened for modification C:\Windows\System32\dll\crypt32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\sechost.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\comctl32.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\DLL\iphlpapi.pdb MeshAgent.exe File opened for modification C:\Windows\System32\symbols\dll\ntasn1.pdb MeshAgent.exe File opened for modification C:\Windows\System32\dll\gdi32full.pdb MeshAgent.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\vmclientcore.dll msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\iconv.dll msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\sigc-2.0.dll msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\libeay32.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\USB\vnetlib64.exe msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\USB\DriverCache\vnetlib64.exe msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\ja\VpxClientHtmlResources.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\glib-2.0.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\vmwarestring.dll msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\libcurl.dll msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\intl.dll msiexec.exe File opened for modification C:\Program Files\Mesh Agent\MeshAgent.db.tmp MeshAgent.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\de\VpxClientHtmlResources.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\fr\VimVmomi.resources.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\vmdbcom.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\VimUiFramework.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\Launcher\zh-TW\VpxClient.resources.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\de\VpxClientCommon.resources.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\fr\VMware.CustomControls.resources.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\ko\VimClient.resources.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\liblber.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\authdcnx.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\de\SearchLibrary.resources.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\ja\SearchControls.resources.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\USB\DriverCache\vmusb.cat msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\glib-2.0.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\libcurl.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\ESXAgentManager.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\QueryService.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\Help\EULA-de.rtf msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\fr\VimSearchUI.resources.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\zh-CN\VpxClientCommon.resources.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\glib-2.0.dll msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\libldap.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\zh-CN\VI.resources.dll msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\ssleay32.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\zh-CN\QueryService.resources.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\gvmomi.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\de\QueryService.resources.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\es\VpxClientHtmlResources.dll msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\open_source_licenses.txt msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\ja\SearchLibrary.resources.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\dbghelp.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\iconv.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\ssleay32.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\Help\EULA-es.rtf msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\Launcher\VpxClient.exe.config msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\Launcher\VpxClient.exe msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\vmwarewui.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\vmdbcom.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\open_source_licenses.txt msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\zh-TW\SearchControls.resources.dll msiexec.exe File opened for modification C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\Help\EULA-ja.rtf msiexec.exe File created C:\Program Files\Mesh Agent\MeshAgent.msh MeshAgent.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\glibmm-2.4.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\USB\vmusb.cat msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Firefox\liblber.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\es\VpxClientGraphics.resources.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\Help\README-zh-CN.TXT msiexec.exe File opened for modification C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\gobject-2.0.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\ja\VpxClientCommon.resources.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\VMware.CustomControls.dll msiexec.exe File created C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\vmwarebase.dll msiexec.exe File created C:\Program Files (x86)\VMware\Infrastructure\Virtual Infrastructure Client\6.0\VpxClient.SSPI.dll msiexec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\assembly\GACLock.dat MsiExec.exe File created C:\Windows\assembly\tmp\5ZY4HSUI\vjswfchtml.dll MsiExec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.log ngen.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.log ngen.exe File opened for modification C:\Windows\Installer\MSIFBC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1779.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.lock ngen.exe File opened for modification C:\Windows\assembly MsiExec.exe File opened for modification C:\Windows\Installer\MSI13E3.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat ngen.exe File created C:\Windows\WinSxS\InstallTemp\20250101220659196.2\9.0.30729.4148.policy msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\1007C6B46D7C017319E3B52CF3EC196E\9.0.30729\FL_msdia71_dll_2_60035_amd64_ln.3643236F_FC70_11D3_A536_0090278A1BB8 msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20250101220702196.0 msiexec.exe File opened for modification C:\Windows\Installer\MSID5C.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.log ngen.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\vjslib.dll msiexec.exe File opened for modification C:\Windows\Installer\MSIBE9.tmp msiexec.exe File opened for modification C:\Windows\assembly\temp\YKHTPFPN7Q\vjssupuilib.dll MsiExec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Microsoft Visual J# 2.0 Redistributable Package - SE (x64)\globdata.ini msiexec.exe File created C:\Windows\assembly\ngenlock.dat MsiExec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220702196.1\9.0.30729.4148.policy msiexec.exe File opened for modification C:\Windows\Installer\MSIE1E.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat ngen.exe File created C:\Windows\Microsoft.NET\ngenserviceclientlock.dat ngen.exe File created C:\Windows\WinSxS\InstallTemp\20250101220659165.0\x86_Microsoft.VC90.MFCLOC_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_15fc9313.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220702180.0\amd64_Microsoft.VC90.OpenMP_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_22d6ba8a.cat msiexec.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\vjslibcw.dll msiexec.exe File created C:\Windows\SystemTemp\~DFDAE8716E7E2FDF99.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI1915.tmp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220750107.0\msvcm80.dll msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Microsoft Visual J# 2.0 Redistributable Package - SE (x64)\install.res.1046.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220659165.0\mfc90esp.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220702165.1\mfc90chs.dll msiexec.exe File opened for modification C:\Windows\Installer\MSIB0C5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1492.tmp msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20250101220750201.0 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220659149.0\msvcr90.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20250101220659212.0 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220702165.1\mfc90fra.dll msiexec.exe File opened for modification C:\Windows\Installer\MSI47D8.tmp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220750107.0\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6b128700.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220702165.0\mfcm90.dll msiexec.exe File opened for modification C:\Windows\Installer\MSIE70.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI119A.tmp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220659165.0\mfc90rus.dll msiexec.exe File opened for modification C:\Windows\Installer\MSIDCD.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat ngen.exe File created C:\Windows\WinSxS\InstallTemp\20250101220659149.1\mfc90u.dll msiexec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Microsoft Visual J# 2.0 Redistributable Package - SE (x64)\eula.1049.txt msiexec.exe File opened for modification C:\Windows\assembly\temp\YKHTPFPN7Q\vjsjbc.dll MsiExec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220659149.0\x86_Microsoft.VC90.CRT_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_d495ac4e.cat msiexec.exe File opened for modification C:\Windows\Installer\MSIACF9.tmp msiexec.exe File created C:\Windows\assembly\tmp\5ZY4HSUI\vjssupuilib.dll MsiExec.exe File opened for modification C:\Windows\Installer\MSI5440.tmp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220702118.0\amd64_Microsoft.VC90.ATL_1fc8b3b9a1e18e3b_9.0.30729.4148_x-ww_673f7fa2.manifest msiexec.exe File opened for modification C:\Windows\Installer\MSIE3E.tmp msiexec.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.lock ngen.exe File opened for modification C:\Windows\Installer\MSI1355.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI58C6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID4B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI103C.tmp msiexec.exe File created C:\Windows\Microsoft.NET\ngenserviceclientlock.dat ngen.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\vjscor.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20250101220659165.0\mfc90esn.dll msiexec.exe -
pid Process 2848 powershell.exe 1912 powershell.exe 3176 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language software.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VMware-viclient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSIEXEC.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjredist64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ngen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe -
Checks SCSI registry key(s) 3 TTPs 31 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\29\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\29\52C64B7E\@%SystemRoot%\System32\ci.dll,-101 = "Enclave" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133802427742877872" MeshAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{5C639832-EB27-36B2-8C36-D0D3741653A5} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{2E945797-82D1-34B2-A20E-1E3426A264E2} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{B64A3013-9A01-32D5-AB76-262B4476310D}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4339C284-85D3-321B-9549-1564A4860276}\TypeLib\ = "{74D636D5-60FD-3326-BD99-BCA8485FF66E}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{767079CA-EF48-3167-BDA9-FE16889DE935}\ProxyStubClsid msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{CBE620B9-E8F8-3E89-B74B-C85D51C505BC}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A2D660BF-248B-30FD-A3AD-542A3975CBBE}\ = "_com_ms_win32_FORMATRANGE" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EC33D30E-0811-353F-A020-D3201DEF55FA} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{6F507D27-60A1-32B7-9DEA-74F335BA82A6}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4F42A312-5754-35EB-947D-D93BE775B522}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48567A9A-25D3-38C5-93B7-3FC4DADA7B66}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{34C346C0-15B7-3543-ADD1-94AD29D78F27}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A1C30F69-4A96-3B1F-991D-E11B4F21BEE3}\TypeLib\Version = "2.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{80096C7D-092A-3F01-B367-D27F0F54AAAA}\ = "_HIGHCONTRAST" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2F6AB880-3022-3FEF-858F-718164271B6B}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7FD42A75-0FA2-325B-8A69-AEE53F5FB3DF}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{03B1A22F-7C09-398F-A087-3B6F79E7749B} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9D283E4-5C20-3761-86E6-030C71474434}\TypeLib\ = "{74D636D5-60FD-3326-BD99-BCA8485FF66E}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{476C693F-9959-3D65-9A36-D508AD8B6852} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{31520681-0A59-3382-9405-3202D9406C2F}\ProxyStubClsid msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{2279B930-DA7F-3CC7-8443-DBD973637408}\ProxyStubClsid msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{B8AB75B3-9592-3F7C-BEB2-2FF2C16D5615}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{ED2F493E-1651-333C-A704-C99AC1C1BA45}\TypeLib\ = "{E710FA11-6607-32BA-8C1A-2015DED1B85B}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{339C1579-28AD-37D9-A579-3485E32A57B1}\ = "_BufferedInputStream" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{835E5509-7706-3DB6-A23B-B902CADD2E71}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2611ACED-83D1-3180-8D3F-9D2270B22F4D}\TypeLib\ = "{74D636D5-60FD-3326-BD99-BCA8485FF66E}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{20D3C758-6009-37AB-8040-31648C48B4AF}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{348AFF13-F3E3-31E1-B1F7-F99C86E0B641}\TypeLib\ = "{E710FA11-6607-32BA-8C1A-2015DED1B85B}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{F353F8BE-2778-30A5-BF74-3E614183D839}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{530946BF-10F4-3D19-A7C1-04EC8F127C42}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{89CBC39F-3146-3E70-874A-A5954CACF6E8}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CD5A735C-9781-33F2-8FD5-BB468EEEA349}\TypeLib\Version = "2.0" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{9174102E-09BF-3F90-A926-CF644700E3E0}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2088175C-CC37-3723-899C-49656FEF996E}\TypeLib\ = "{E710FA11-6607-32BA-8C1A-2015DED1B85B}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{9C8507EE-1F00-355B-9BC2-06EB75866AE6}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{278FB2D3-09A8-3889-88B9-6B51C50C2E84}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{F53F71DD-E79B-3EF9-9CE3-3B2FF7862A5A}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{070315A7-9488-35FB-BA37-5010C5E4D918}\TypeLib\Version = "2.0" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{5A66A8D5-ADA6-3CFC-B5A0-3E7BB0C711FF}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F0CA16C1-0080-386E-B2BE-9826E3A74739}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0528988E-C509-39D2-9DB9-637D13CA07A1}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DA3A449E-8655-36DF-9C50-A82EAF20E507}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{9042FDF8-29BC-3655-9B01-DF6482D5F65A} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EE914D61-2EC8-3E62-9911-7BEC74787754}\TypeLib\ = "{E710FA11-6607-32BA-8C1A-2015DED1B85B}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9F0CEB0B-432A-33D1-83D4-FDDA73959D54}\TypeLib\ = "{74D636D5-60FD-3326-BD99-BCA8485FF66E}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{F8CF56A0-D329-3CA1-BC21-93A2B42F3860}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{278FB2D3-09A8-3889-88B9-6B51C50C2E84}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{5C1C58CD-48AF-3B52-A468-7EAB4FC2EB8D}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6ACEEB7A-7624-3FEC-AD26-E2E410DCBAB3}\TypeLib\Version = "2.0" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{19E77BFE-0010-3028-8631-8186AB8E2BBA}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{5B49CBBF-6541-3364-A856-AE2BEED86840}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4E2257F2-7D71-3A57-8DE0-6FFE53587689} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31C0D349-F2C7-3857-AF2C-B24BA8BB6318} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FC578574-C640-355C-BA3C-920AF2D544CD}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7941C839-DE7C-331D-86F6-8C06B5888BC6}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{76DEF5E3-06A3-3721-AF71-262B69D59448}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{653F89A3-212E-3714-BC48-A8F441DC4FC3}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{A06290FB-26FF-3E88-B5A9-D40302DBF4BA}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{EC8CBB5A-0AC8-39DE-805D-85CC9043F429}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5E95255A-F5EA-3807-BEB2-FF455A9106BE}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{50097C24-ED42-372D-BECB-85B675C9DB96}\TypeLib\Version = "2.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3C5677-621A-3B15-81F9-963AE1A90CA0}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{1A66A95A-60E7-3379-AC5C-152D703304D6}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{1FC3E83D-08B8-3F19-962B-8780A077F7C6}\TypeLib msiexec.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\eicar_com.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe 3176 powershell.exe 3176 powershell.exe 3176 powershell.exe 2848 powershell.exe 2848 powershell.exe 2848 powershell.exe 1912 powershell.exe 1912 powershell.exe 1912 powershell.exe 408 MsiExec.exe 408 MsiExec.exe 3212 msiexec.exe 3212 msiexec.exe 3212 msiexec.exe 3212 msiexec.exe 3212 msiexec.exe 3212 msiexec.exe 3212 msiexec.exe 3212 msiexec.exe 4640 MsiExec.exe 4640 MsiExec.exe 4840 chrome.exe 4840 chrome.exe 4260 chrome.exe 4260 chrome.exe 5832 chrome.exe 5832 chrome.exe 5832 chrome.exe 5832 chrome.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 680 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeShutdownPrivilege 2760 chrome.exe Token: SeCreatePagefilePrivilege 2760 chrome.exe Token: SeAssignPrimaryTokenPrivilege 900 wmic.exe Token: SeIncreaseQuotaPrivilege 900 wmic.exe Token: SeSecurityPrivilege 900 wmic.exe Token: SeTakeOwnershipPrivilege 900 wmic.exe Token: SeLoadDriverPrivilege 900 wmic.exe Token: SeSystemtimePrivilege 900 wmic.exe Token: SeBackupPrivilege 900 wmic.exe Token: SeRestorePrivilege 900 wmic.exe Token: SeShutdownPrivilege 900 wmic.exe Token: SeSystemEnvironmentPrivilege 900 wmic.exe Token: SeUndockPrivilege 900 wmic.exe Token: SeManageVolumePrivilege 900 wmic.exe Token: SeAssignPrimaryTokenPrivilege 900 wmic.exe Token: SeIncreaseQuotaPrivilege 900 wmic.exe Token: SeSecurityPrivilege 900 wmic.exe Token: SeTakeOwnershipPrivilege 900 wmic.exe Token: SeLoadDriverPrivilege 900 wmic.exe Token: SeSystemtimePrivilege 900 wmic.exe Token: SeBackupPrivilege 900 wmic.exe Token: SeRestorePrivilege 900 wmic.exe Token: SeShutdownPrivilege 900 wmic.exe Token: SeSystemEnvironmentPrivilege 900 wmic.exe Token: SeUndockPrivilege 900 wmic.exe Token: SeManageVolumePrivilege 900 wmic.exe Token: SeAssignPrimaryTokenPrivilege 656 wmic.exe Token: SeIncreaseQuotaPrivilege 656 wmic.exe Token: SeSecurityPrivilege 656 wmic.exe Token: SeTakeOwnershipPrivilege 656 wmic.exe Token: SeLoadDriverPrivilege 656 wmic.exe Token: SeSystemtimePrivilege 656 wmic.exe Token: SeBackupPrivilege 656 wmic.exe Token: SeRestorePrivilege 656 wmic.exe Token: SeShutdownPrivilege 656 wmic.exe Token: SeSystemEnvironmentPrivilege 656 wmic.exe Token: SeUndockPrivilege 656 wmic.exe Token: SeManageVolumePrivilege 656 wmic.exe Token: SeAssignPrimaryTokenPrivilege 656 wmic.exe Token: SeIncreaseQuotaPrivilege 656 wmic.exe Token: SeSecurityPrivilege 656 wmic.exe Token: SeTakeOwnershipPrivilege 656 wmic.exe Token: SeLoadDriverPrivilege 656 wmic.exe Token: SeSystemtimePrivilege 656 wmic.exe Token: SeBackupPrivilege 656 wmic.exe Token: SeRestorePrivilege 656 wmic.exe Token: SeShutdownPrivilege 656 wmic.exe Token: SeSystemEnvironmentPrivilege 656 wmic.exe Token: SeUndockPrivilege 656 wmic.exe Token: SeManageVolumePrivilege 656 wmic.exe Token: SeAssignPrimaryTokenPrivilege 2844 wmic.exe Token: SeIncreaseQuotaPrivilege 2844 wmic.exe Token: SeSecurityPrivilege 2844 wmic.exe Token: SeTakeOwnershipPrivilege 2844 wmic.exe Token: SeLoadDriverPrivilege 2844 wmic.exe Token: SeSystemtimePrivilege 2844 wmic.exe Token: SeBackupPrivilege 2844 wmic.exe Token: SeRestorePrivilege 2844 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 1904 VMware-viclient.exe 1836 MSIEXEC.EXE 1836 MSIEXEC.EXE 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 2760 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4840 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe 4260 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3416 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 4944 2760 chrome.exe 83 PID 2760 wrote to memory of 4944 2760 chrome.exe 83 PID 4960 wrote to memory of 4584 4960 VMware-viclient-f0c1e456.exe 84 PID 4960 wrote to memory of 4584 4960 VMware-viclient-f0c1e456.exe 84 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 4480 2760 chrome.exe 87 PID 2760 wrote to memory of 2352 2760 chrome.exe 88 PID 2760 wrote to memory of 2352 2760 chrome.exe 88 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 PID 2760 wrote to memory of 3228 2760 chrome.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\VMware-viclient-f0c1e456.exe"C:\Users\Admin\AppData\Local\Temp\VMware-viclient-f0c1e456.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\Temp\agent_out.exe"C:\Windows\Temp\agent_out.exe" -fullinstall2⤵
- Sets service image path in registry
- Executes dropped EXE
PID:4584
-
-
C:\Windows\Temp\software.exe"C:\Windows\Temp\software.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\7zSDC08.tmp\bin\VMware-viclient.exe.\bin\VMware-viclient.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1904 -
C:\Windows\SysWOW64\MSIEXEC.EXEMSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Temp\{06497AFB-9894-4D10-9687-335B18B5A25E}\VMware vSphere Client 6.0.msi" /L*v "C:\Users\Admin\AppData\Local\Temp\vim-vic-msi.log" TRANSFORMS="C:\Users\Admin\AppData\Local\Temp\{06497AFB-9894-4D10-9687-335B18B5A25E}\1033.MST" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\7zSDC08.tmp\bin" SETUPEXENAME="VMware-viclient.exe"4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\{593390AC-CACE-4278-AA77-350012BF10B1}\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\{593390AC-CACE-4278-AA77-350012BF10B1}\vcredist_x86.exe" /q5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1288 -
\??\c:\50e6f6e95277a3f412\install.exec:\50e6f6e95277a3f412\.\install.exe /q6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4084
-
-
-
C:\Users\Admin\AppData\Local\Temp\{593390AC-CACE-4278-AA77-350012BF10B1}\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\{593390AC-CACE-4278-AA77-350012BF10B1}\vcredist_x64.exe" /q5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1204 -
\??\c:\76ee9abacf6e57bfc84b6c1f4d73a0\install.exec:\76ee9abacf6e57bfc84b6c1f4d73a0\.\install.exe /q6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3144
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff927f6cc40,0x7ff927f6cc4c,0x7ff927f6cc582⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1768,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1764 /prefetch:22⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:32⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:3228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3556,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4412,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4956,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4948,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:4192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4348,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4516 /prefetch:82⤵PID:4804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3568,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5188,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4968,i,10445566649942197142,11174185414802147085,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4972 /prefetch:22⤵PID:352
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4112
-
C:\Program Files\Mesh Agent\MeshAgent.exe"C:\Program Files\Mesh Agent\MeshAgent.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:2004 -
C:\Windows\System32\wbem\wmic.exewmic SystemEnclosure get ChassisTypes2⤵
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
C:\Windows\System32\wbem\wmic.exewmic ComputerSystem get PCSystemType /FORMAT:"C:\Windows\system32\wbem\en-US\csv"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\system32\wbem\wmic.exewmic os get oslanguage /FORMAT:LIST2⤵PID:3584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -noprofile -nologo -command -2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get C -Type recoverypassword2⤵PID:872
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get C -Type recoverypassword3⤵PID:1620
-
-
-
C:\Windows\system32\cmd.exe/c manage-bde -protectors -get F -Type recoverypassword2⤵PID:3668
-
C:\Windows\system32\manage-bde.exemanage-bde -protectors -get F -Type recoverypassword3⤵PID:5004
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2976
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3212 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D1233A877F54EE5B8B3F5A076427E077 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Users\Admin\AppData\Local\Temp\7zSDC08.tmp\redist\vjredist\x64\vjredist64.exe"C:\Users\Admin\AppData\Local\Temp\7zSDC08.tmp\bin\..\redist\vjredist\x64\vjredist64.exe" /q /c:"install /q /l"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\install.exeinstall /q /l4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4364
-
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E6B76E80BDB68F53F85D19B38F40E85A2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "Microsoft.Build.VisualJSharp, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "VjsWfcBrowserStubLib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- System Location Discovery: System Language Discovery
PID:924
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "vjscor, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "VJSharpCodeProvider, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "vjslib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "vjslibcw, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- System Location Discovery: System Language Discovery
PID:1004
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "VJSSupUILib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "vjswfc, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "vjswfccw, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:352
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "vjswfchtml, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "vjsjbc, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe install "vjsvwaux, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- System Location Discovery: System Language Discovery
PID:872
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen.exe update /queue3⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4112
-
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding EB29ACBEDD2A6B3A289BC8F31F7147082⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Windows directory
PID:1008 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exe install "Microsoft.Build.VisualJSharp, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵PID:4972
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exe install "vjscor, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵PID:3184
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exe install "VJSharpCodeProvider, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- Drops file in Windows directory
PID:124
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exe install "vjslib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- Drops file in Windows directory
PID:920
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exe install "vjslibcw, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- Drops file in Windows directory
PID:4336
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exe install "VJSSupUILib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- Drops file in Windows directory
PID:4312
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exe install "vjsjbc, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵PID:1016
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exe install "vjsvwaux, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /NoDependencies /queue:3 /nologo3⤵
- Drops file in Windows directory
PID:4412
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen.exe update /queue3⤵PID:952
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4696
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 90CCC72CD0E906A0FCC1E4C0A750A5022⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\Common Files\VMware\VMware Remote Console Plug-in 5.5\Internet Explorer\vmwareRemoteConsole.dll"2⤵
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 790BA032FE0DF58368D908F58B94EA8D E Global\MSI00002⤵
- System Location Discovery: System Language Discovery
PID:4364 -
C:\Program Files (x86)\Common Files\VMware\USB\DriverCache\vnetlib64.exe"C:\Program Files (x86)\Common Files\VMware\USB\DriverCache\vnetlib64.exe" -- uninstall usb3⤵
- Executes dropped EXE
PID:4852
-
-
C:\Program Files (x86)\Common Files\VMware\USB\DriverCache\vnetlib64.exe"C:\Program Files (x86)\Common Files\VMware\USB\DriverCache\vnetlib64.exe" -- install usb3⤵
- Executes dropped EXE
PID:3544
-
-
C:\Program Files (x86)\Common Files\VMware\USB\vnetlib64.exe"C:\Program Files (x86)\Common Files\VMware\USB\vnetlib64.exe" -- install hcmon3⤵
- Drops file in Drivers directory
- Executes dropped EXE
PID:1400
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Checks SCSI registry key(s)
PID:3360 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "C:\Program Files (x86)\Common Files\VMware\USB\DriverCache\vmusb.inf" "9" "4bd894f47" "0000000000000154" "WinSta0\Default" "0000000000000160" "208" "C:\Program Files (x86)\Common Files\VMware\USB\DriverCache"2⤵
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:2532
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3416
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵PID:3152
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4840 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff927f6cc40,0x7ff927f6cc4c,0x7ff927f6cc582⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1772,i,7245770888909593320,17734529366590549546,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=1776 /prefetch:22⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2096,i,7245770888909593320,17734529366590549546,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=2108 /prefetch:32⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,7245770888909593320,17734529366590549546,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3052,i,7245770888909593320,17734529366590549546,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,7245770888909593320,17734529366590549546,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,7245770888909593320,17734529366590549546,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3056 /prefetch:12⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4772,i,7245770888909593320,17734529366590549546,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4812 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4816,i,7245770888909593320,17734529366590549546,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1056
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵PID:5328
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:5408
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:5772
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4260 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff927f6cc40,0x7ff927f6cc4c,0x7ff927f6cc582⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1940,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:5468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1768,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=2040 /prefetch:32⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:5432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:5712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3524,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:5880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4752,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4768 /prefetch:82⤵PID:5948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4764,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:6108
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff74a394698,0x7ff74a3946a4,0x7ff74a3946b03⤵PID:4760
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4836,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4324 /prefetch:12⤵PID:3512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3376,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3252,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3236,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:5596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5284,i,3992154391846018756,1200290007145950050,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5296 /prefetch:82⤵
- NTFS ADS
PID:1868
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3264
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5828f082302e94cbfbb1f3f13e491c706
SHA1bfd17b3f08461e501fd625518de8660ea8b4f4db
SHA256e63a5274b437b55c65bf1259a25bbf602335f466f5d01e4ad0291be21e3edf3c
SHA512ce7b613254e9622ffc455368cc9ec8c31eb12253dddd34e07843f944ed9b2e260148762203eec0d29e268c1f771ecf3f3f731289731cebe1fc4359ccadc0c049
-
Filesize
40.5MB
MD5b3502f10ce3904737bc5df6c559386a8
SHA126614b210260eda83bff46ac82fb961c4b2a8773
SHA25610d6e07947afb41de6529d751117d276c7232c483b1627f027abab22a502489e
SHA5126dbc00421bfcfdea2e030e5efecd349ee218e66532fa5bce9c1bc9c23adb59cfb2b9e81509751af4a2b1f78480d6554f996a5af120a0344f53c3e11871774165
-
Filesize
1020KB
MD574edbb03de3291fcf2094af1fb363f1d
SHA116b5d948ed7843576781dc4f2a391607ac0120a4
SHA256dca9f45efed8eab442b491aebda3e3cce7f5f9fc5de527d2dbdfd85a5be85dfa
SHA512b08eb03c54f25979c5aee745530ecd51c5761eb99871b867ff84e14590b32ef3247e17cf63bf953ee1efcb0fda8c4540191b9280db33359fdca352967e42b289
-
Filesize
399KB
MD5f29721fbae6bf39f07b93dcc126ca9d2
SHA12d7219dff7f78a8972967084235a877fbb7eff7e
SHA256c473ddda1ff4e7381a933c417f88bb02bdaa7f2ca55cbdb8877b2a8436c400e7
SHA5126127a884ff86dc81411a2603de51849702a551590b18ba0ed666962362e0728216ae2d41359a41266f25076ed38e77361c804244fe133a97e00fc0e4f09b5ec4
-
Filesize
153KB
MD5e226061e7604d98eaa3c97837faaaf4c
SHA1cdb3e88ab17e34128401764940256f22ad3d432d
SHA256b251f6aa5c9e1f49415c4068e81bc626cff0e3424c80399bfbdd1697a21989a6
SHA5129307b5ecaa897016b7e854ea0fffbc46be313f5107b94d85f4be632138737cd697595508d277e3c865102b69ad96ff8514b81dba8f03b6a4e736e519d103a9cd
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD5129695cb13d7a74b2339de2c6556dd72
SHA1314d3406a078f2c388ddd861d66e41d17985ac35
SHA2562afff6d4c92cde01a63f9c67fa7a035a1ea17c25dc1ed06f59594880682eb02e
SHA512085502747eae8f5927ee5b1bda77ae3eef5a3828de370deb3d2e4c199c28aab2dbd0d5bc58c4a61f582548b11dd865ffa2c21e58cbd9376051ab042c1b7337b4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8653a5c5-fc03-4970-93b8-26190ce8a4bd.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD57b0249cf721f0935f797e250b63474bb
SHA183340b5a3db343276e060d5e97665986819d4630
SHA2567ebd919506d0f3b507316ae261975fe009785f29c6a8109c88e117e641ac887f
SHA51255dd67b3069d07122f384671eef38d5079ec76cbeb02990d6fd4ab13be8c713c62c19e006b7da707cc50f810dc91ec5e92215fd4339d8f577698a12fbf854459
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
1KB
MD52fd279b692f3c4476cfc57c62fa8be3f
SHA1c4f75ecb3268b62b1b7bbcd58b8ad68674c93dbc
SHA2569c5668bf529c641b3651d5aec06b27d3345162eb7edbdca0bbc44be1d86c3600
SHA512e873d426c67b2bf2b9aca294078a69ea8016aaf05281457c23002d29b941443eaa231e00a002d6ba4007a3ea760ab57a80869698d5d7d6d55e4cdf6283ed78f6
-
Filesize
216B
MD5a88399bdfb6d363d46308373797e6d4d
SHA197069104dcde9818a4e7a6c22fd6fa1bfb9e450f
SHA256e54fc9441ad37175b29109d9c1115e05fdb3da0d0327d5828ea44120aa9c2f4e
SHA5120b6ff851eccb1fefd0b8b48e59bafea648c484e6912226fa7d1079699e5360e8b02100d23799021f23a61f56155b9f3c72973e4f7ae29910ecec9b911fdf1118
-
Filesize
216B
MD5ce022524cbd5ef79ff50becaaadb80a9
SHA1079bd68795992c08c8ee35a503aa6145f5876650
SHA25671ca9f4eb370f6d4e87bd720218e2ac82ef1af40b4c325afd9b5af175423fc69
SHA512f88e935e03513c707158295241980cac205fcd842f9fbab8839d8901920954ce7250d61db1f3bd25c787d4eb9a2de8f8c267d0216f4be1928526a29bb5577522
-
Filesize
216B
MD53bb2dc823373e26d58f4569de01d9620
SHA18d66c8cd4889237c7723d84b40649cf6520e1aaa
SHA2568a393521247e3ce907509b83d3fee675c0cd6af0bf31a1b44669d85c34565b9f
SHA512ea38ef3e97eccf774ff75532bc1e5048efcbc1f0d709521028e067a77672046f3822690b9a50d4314fafeac6b92914dd64d7c4c08b1402ee95c35aeb8c97949b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD59fe653c66a4ed6ee76557677a1c83462
SHA1f3b28ecc030877e5cb5b6665c434581762a49247
SHA2564b65e73630d7aa13e8dd5bb8f705d231edc12f0e33e6fbd11d360206e37abf4e
SHA5121eeaa7961f6396d0714e41f3ebe3176e24fbae654dd7f6e335eb52f6971c208d392df716cdf9600c32550918fbd0d04dc914a941dec0608ad153a6b4bfc2be26
-
Filesize
1KB
MD51922fa176b72899adbc1143ffb5db5bd
SHA13646b0af3f996ef484f19a5bb7cdb98aa35d6f19
SHA2564dbbd16ac6c374e23044864d2d97f11592fbf509770fb30b6ebeee1e9296208c
SHA5124025d48d91b1553fddfe2f3ed3e3c15438308bbd4f25f6eea7e6fd6fcc4df42052b7d20867e48b2364129e6554eb821003d5b05d254e35811cf9090a6b554ca4
-
Filesize
2KB
MD5ade1965f59b10f5bb344f03a1b444858
SHA18fc69f484aa50557ac6ee43de7d40d50b5b9c11b
SHA256a9bba9e95c19bc0eed0c53f7e633c783d2e6d8a307628af1c44209e813e7eeb7
SHA512a6323efd204298228ec9100907679c6e7837c8f519c96a0066e7538e4a39ec9fb10f217d7863f4708b664d89e8271a0e6f145ee4b5a74f9178dd65e1aa0ef2ee
-
Filesize
4KB
MD538e1ce1494245834ba0ed65a6d8709a2
SHA1cc649a46a268762c9c54231bb6ac35c91e3cf51f
SHA256e1fef0200d41c848e58157cc37c7bafb9c50f18ee33c1e3d5d36cb362eb28540
SHA512f1acdd88dcc2ea5ace0c9ce047f814db43b812c9aba70a3d0fb15dae2b48f7e1220e6cc1a742cb1420f2dc460ddb241c3209f6d34d636ae85acf22a1dc898b68
-
Filesize
1KB
MD5f11448fb1faaa96755ffead50bed7e20
SHA11ae2297e3b9453df78460d2b39f7955888c397ed
SHA256970bf801375030de31ada090ffbbc7a9b8376179fe29af85bac34b27c716b7ff
SHA512bdbee6df4b04c7fb0423c4d4427dd8721667e2abc16562cc28f7218b037259f4f6276e03ee4bad4d7d427102a344fb0cd639b336966156c71c473c14ea044e4f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD539dd3b7782d2957b143868670e6ab556
SHA1d75fd427716f08cbec698916bd5891d5d7f029b9
SHA25667d43228c7176137738037085cb197e52913bcafcdde581df4f63161dce76b2b
SHA5128ae90928880d72c4398ff254dac93b6915d83cfda5397fdb06d8042d37d2e059fa97a11aad5430547b9bd98b81904ccd33ce1c27ac7a01f06e970e1049ad6e6d
-
Filesize
354B
MD59df740ffa964e914a11be7ae808b3253
SHA1ae6c0ce4cfa6ec71829bb3a5282b5d2b59098d7f
SHA256ca015f1e2707a5ba558e295d64644f30d026f028e07494c7c12aed812962817a
SHA5127828ea0f1bf155959cc0a1ba8b0d3b1cf10b0d4697009f3ebd77da8a7d9fe1efe42fe0ecb9666a2a652595f8b02835c5bd3555a74ac8d69dfe2594c95abd8a6e
-
Filesize
356B
MD5d10b33bc9912f7d73070c59f640f95cc
SHA1d867ad5441660d392e939e16f3363a69dd95b095
SHA2561dccb7fa985cce080fce857e245f632053f744c71f1b0dd7edebb0f97d463171
SHA512967a8365fca2bf71734f1e9fefd9557e5849e72126e3a2ef404c8b47ab2a4eb47347b0573ca186e7b260d8821d4668800b7d6bd2971c7f43a92106a0698b9ebd
-
Filesize
686B
MD5f48f1e6fd8d76aa57356668bd4556bd0
SHA1d2d7a7bc5d65ef86d8145b47722cbb4bdb108eac
SHA256aca08dc2bb2a4b17981a6326d32305e1355038c180ef20a707e25066ebe9655f
SHA51209f9d93e12116c45902cc9f826bdd2babbcc5f101f76ffe14574194d9b7b4f9d776a1f806a97196c12a6d87622a04ce1845cc058217451913b5801e8e27b7228
-
Filesize
354B
MD5f387056a4b73cd0395729f257a69923e
SHA1efa1cae1593a6494c779e78bff2b3fb5fb6e108b
SHA2569dfcd39426f2e1ac9ff5fb0001c82994503365d1c1d28e0412da7817ee413e1b
SHA5127c05f88a5b09e7ee703ed51bcadd40c7546cd81c21288e241a217125f6e1446c53748eb8ae3f7a0a78d0d034ee60a448a6942d30d9e9cdcc549207ca8d82d4de
-
Filesize
356B
MD508c0b4f6ed5e33ca00b499e11a87c3c9
SHA189c11f43eb0ac30976ee93fb802f2dccdb0e611e
SHA2569d81bb2b857db2a8028829eb58b5aa7af88b54aae1a45973facf9e902ef194a7
SHA512223be690be83cda4d6ee14b1dd90ef7b1e416c20dd0a502633a2c9cf70cfdaec6ad7f062c1aedccf422132f461f96fe17d3e3db39c63a8c0da8dc2ca3c157929
-
Filesize
10KB
MD59fd594c128e6bdbcc366bbf8e1a9e39b
SHA16f85c9bb6abed2eea11e3a57bfcdb3d2d256b969
SHA25668ba13fb07b08b340a9eb4a910ba15881e07ecc48776f70fd0227601ded82b73
SHA512b1500b80b7e04560a77309170440e949bd6d28a56162dfd897b3592cac42c2d723f85d9694a375bee54aad5d4da6813e2a89b1af95df196c1a94c648349ee3c9
-
Filesize
10KB
MD52febb7f4bd0dca1090cd6871f5c353a9
SHA1e93e097484c5fc93cdee965c9fec28d147a799b1
SHA256634704e85975a2be50b7b939adbff223536ea05444656168f443e0388be76f96
SHA51280cb182536ea4cc3e129133be9b2c2e31e60a3c04d61ec269f7979e9ef4a735ddee784cb2007e010f44bd2f37211c7859d35689f02aeccc0e0443cd4b750e3af
-
Filesize
10KB
MD512583ea4f0000a7953d8fd57af04fe43
SHA12ccac207f2d04a99dc35b6f4861c63363dcef986
SHA2561320e56f4aad0e8f735d382b9f64f0c7045d427a8acb2df14d966092ed354b7a
SHA51261b8b259c1679262a56bd6e86b7b8072f0a36c8b20fd38a972639af0550ebf28640c8e79d414dfdfa2557470a0d49da7c070cc8e4dedc7a1e770390dee15e345
-
Filesize
10KB
MD5fb170887f8ad1fa13432ac878d6363c1
SHA1da99611b0ce3f30d529108e51972ed69bb668152
SHA256871f160f1b8e4f23d08648272ee32f0bdda5968a7cafd9d5ef5f33ca32dc51a0
SHA512f7401e780a5875ab42a33701d2e368837100dcb27e53f8c2c1c6bc0a65f98d553ba39df31e4b380f6f61728bcde392dc20f661021ece6394a8d77f607f91a8aa
-
Filesize
10KB
MD56e7936da8f3c1ce7954c62a6dcaae42c
SHA17d8a792c3e34fdd2ed1d347be16cb6e60a99c1fc
SHA2566838e258ceeb48a4bbea56dd606f9dd17c9be18e4c83e5740b23fec0fe93c796
SHA5123a13464d868a1d5da9a0909b1bcce31a4b832038d58b9324405ef19892697df7a9a8a4e2b407a64f60003b91ecb3b7a5a070a64b62772e49d7e5e0dd46d7e625
-
Filesize
10KB
MD587b168f8f073c47664513129370a27d4
SHA1a945a5faa514b27428f8a7d65b4e3ebad0aad524
SHA256da989ef0bb99861b8d970d58fe117574a8ab72c8babdb7ec7bcbf29cc38d3efe
SHA512dd693873b1b3b9e51443d317fa735eda7dbcb91793cc7a9ecfc98bf0f4e937eac5931d95c6c6fafb169242aa868318014a1f4d592ea6d95fc04b596309d20fee
-
Filesize
9KB
MD54061aaf2f46c959e56f6a104cba2b7d1
SHA1308140c67adbbaf25d2e4439df256ccf5ca1cf62
SHA2560ac93cdfa8c92c832c418f6b35e3a9837b66577fd32790ad256677a8daf8f312
SHA5122e7e2623f0c0777f8a41080bcb5d8db147baa5d740cb09785483d2897dc895f9086e4dc3f629e851df888f6e841777f029490387bbc153a3a6f11ebb77e2ef86
-
Filesize
9KB
MD5591480b2395ce3d3a50b955759af9f16
SHA19e3e4a09f482ffd46fc5d98d9f6d038d8ae4660c
SHA2565da55cd62e0457c8ea1a116d3a4eda02728085759e71570dd5e7c6a672e24ecc
SHA51256b778903deac4ebee88d496f10a95dfeeec832539e2a3fc23d0205e7be583acef633acfd6332c3b54ce8d959ff07418fdc51ede2311966322dc234592cf9e6b
-
Filesize
9KB
MD5d33099e17890959da936e8325ca0b288
SHA14013b7a740af73617840277818c658c34808531d
SHA25686746be2966682bcd6ee4c31d23d05f807e6064793ce1f52e98f4bd2fa618396
SHA512ad8465a77c4ba2a194ec9841f76034bb661565f764dde507257cb2e099a89280e2dce8106c82f67188be3f50de7026591998682d32a375180f10fb13a2da14b6
-
Filesize
9KB
MD5314ff5f40994b643fb7d158676f7584e
SHA1b907c0c5f240e86f88114b2fd111f6088faa6157
SHA256adc3e440fa91b3ef0f9028b98647ad43316cec1fcd2141a6033de433dab109bd
SHA512261bb54652ad7fa0febe3d5aa776c36f760a74ccb0bf786f2302fe5d2b259a3ba062b7ee41d2398ccfac46266eafe199aa2529065f04e6c9300960866dc3f27a
-
Filesize
9KB
MD50b3851b6690cb8e925709444a2513a0f
SHA1c5adb7fe8ac9cab22f329153fbfca4d27ab04021
SHA25664cf7784bac551eb91b75c9f6b27ea0d222c2065b817ff40e11c8c0fd281a6bc
SHA512bfd5eec47dbe8846398d5036be7e3e07c8dd0d9afb4e356f848d764dced86cf16a05e5c40ccb1c72c6f67f1b1d5b74c53f1413001fce98653c76867f076a9b12
-
Filesize
10KB
MD58933f335ab33ba88aa96c2311e175788
SHA1b99f2b7c2d189aa5460e8e5af7673877242861cf
SHA256356f32750692c10e3f09b49fb637fc2de4477c83abae38a8fb8b0fa048afdf3e
SHA512ee4064f7e8af47d7ef4af3925ce04434b063c9a9989af2a97b65a1f8b824f0159ad0b6e415323e4b4a4649e01103ac511c344ddf42f697f101c5d1a3da3a2632
-
Filesize
10KB
MD58ff6d64d323568d003c8b7bf868e785a
SHA17914181e3a1fd987ea1c3c2e51a21f90d28515a5
SHA256233aee373e9cc29d0268a1d0653ea9ebcb3acd3bb11e56bd7853660877e23c9f
SHA5126b022dd75d230ef7b57e973146393a6e9784e7f8983ef77def4b832bf66596c16525ddcc021ed5cef115892bf20566a744db9a27f27b3c6a1d197ca4e73d3222
-
Filesize
11KB
MD57aeb01776ce509c2968ac0fb42bd9bc0
SHA1da9fa3be9d6eabbb80b937c5f6b391b74218c31d
SHA256ed73f9c434764a259bce44a2cef6fe8151e55e3fb3e48c5683ede3919179e105
SHA512937f1352173eb8d88d11deb46500ed4667c94081ef564a1326fa88bc80cf803a98ed86626ff56589b6c5328a27fc1525338e8de770abb3b932d26a2e072cd40f
-
Filesize
9KB
MD5a9b28ec05538a1e3307dba1ab93e3512
SHA15bc96ffcbe3a4058d06137fa00609441d455aa79
SHA2568eeb8b337d910a9ffe0e0b1f158393c7d242e11a2d02e039ecb1a578eee9fce2
SHA5129ff7661afe31c0def2fed6bd9f4fb34d7c90fe67f0f350a0e879efabb5b158ec8270d94872387af6ab2e7a492d9068a8b9d1382d7e174709e5a21b10a6d93792
-
Filesize
9KB
MD5abca7e6320ecc5a74d068125bd158031
SHA1f00a08ee1981b7c877691c6047315138d6e7656a
SHA25664cda62431316b80881f2ad8f8a76a3a0d2f0457144d8bec26b87d8188f6de25
SHA51208645ba191257184fa7e1929b773cf47270e48b0d6897f4a0b0dd26297a320fdbbbd8bf748da3582c73831db2cfa2922e508145224ebe0864e5a8f0c22ef8eac
-
Filesize
9KB
MD5e3aa0d80cafadc751eaa163fc78bff80
SHA10733b0d8d279e6e04cab862f5fe364c22f21d800
SHA256008c01164f7bedf5a957b546f16f38a5bd23928363cc09606e7beff50543dc58
SHA512d81c6e818c08d48dfea7765cbe8f5029b49afc9d03564e2dee25b20bd8e14bfab24a0e1545aca5c718b4e91f31e975a59d154e87f978fa624d803e00da8683c2
-
Filesize
15KB
MD5da7274ed73ed697104d479124beb7878
SHA1eed8d343fb217a7a0eb119105b97d9384d007172
SHA256a15eadc61dcda26ab356bebb2fa7472f208b1345a00f094099d34b0aa6d62081
SHA512e60ca67c2dda1c2824732b24216fa5f4e762c99c4578b8b5c75be6556275fb773cf385e8529a744fbccaade308c6ac89a6aee4153d45aa3ad1088d998c805c9b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD590464c48cdab76b679a33c08cbe98170
SHA1de237b5964ef9971cbb7fef8872f0cdd7d52b9d7
SHA2564950b6b9823d8533ea0eadcc08ffb691b7718431aaf682c6ca694cc6210210e0
SHA512c003d72d8ec9cbd07ace8bb2086a17b363febaa493a7c3def6b6f2345622113d1d35e9cd62d51a7328de969756ad2f9f7c336ec7a0879f4cde0b51e34250a0b8
-
Filesize
119KB
MD57364cecfc106abf2e5482956b3da996f
SHA173fdca78e8be45997b6c946e9c2840c50f19b8d8
SHA256c522666153b0f8eaa67768851ef97f70f245cbd341b188a61b97748aaae9b964
SHA512df89111e0144815d3e414cd493cf0f3b8687d567e5a5e3f46acb024d8a898e8e8317fabbfbfae8ae3f323fdc7ec53aa38bedb93436ca8c177662a5c942fe38bb
-
Filesize
119KB
MD5180aefbc7bd94649e9d0a08657f71a52
SHA1fd99cd3abb3a8d712288815c0240222db79562c1
SHA25611e2d06d95daae0d23ab2ea820baf41cb294a20778ae3a9a680dd6f07ce8fe2c
SHA51226640c8eb8b1dfee5ab06c3bbbba9e92bee827b7207be74e88d6770848ec8a57fd5f69be48ad0295d48f68c7aa153b19e6e51a1d5cfc85a8090b87ad73f4c5e1
-
Filesize
119KB
MD5462fc26c604bbea3539ea7da509b2b79
SHA1ddd2530265f4edb276fe950ff92e5ff2f33552d4
SHA2567f063ddc09d90c13fdeab4434cd58aa5bdfa1f44f28228a89d8116d7f37fc8b9
SHA512bce8da94ce328f457a7301440f661edf80cc376bbe9c13423e5be0457d1e0e0ad69a800cc9742880ba166810af2301c6ad1d684fc4a13342e17e3f286327af1f
-
Filesize
119KB
MD5ab30c5b5b4de95aca93ff0e17b172a85
SHA1ccc2f936bb1660d4a530c9ffa26dca23aa48312e
SHA2568d8f90b4e896b32c21f531a19af0209617357b789c5d2a75e8200f77405b88be
SHA5124bee97cd2b3726e937dea869df5cebef16d518a8aafa518ee1f13c5e87543abf3e11b35da74c033613c3920aef8d59aa569c0a643826a3a190a5fa6f16665f3d
-
Filesize
119KB
MD5a6e90c652e9efb1fe6b8774470e14cb9
SHA1108e4443c99106b58e7cc17c6715dfc30f946285
SHA25648147693f34f793a106c00d991835d3dc5c2cc6cf55719157512e2297d9b448b
SHA512a0724c44712f6d6b8814da863010fe5c093fb4a235333b6829f17a89a0f289810fcfcebf0580b29e0faf171abd14199cae28ef2bfa3291af2040a321a1a479fa
-
Filesize
231KB
MD507344fd09d91ece23f3787ce4e7cdf5b
SHA197fd7a759bde6b27aa9e21463c91576ce67bdd17
SHA256e916a83c7b8eaab05950a014fc837803e2e4ca59ee8740248b74395f8b12f44a
SHA51259725d886e910bef17c780b43b7a5dc6ff3afe7a75720b44a0ad176316149f1736d815490f5997c5d5e98b26da44425438feb8eae20120a6aff7e637fb36fca0
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\4dfd1665-1177-493d-b2ba-162103434316.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD51e7dd00b69af4d51fb747a9f42c6cffa
SHA1496cdb3187d75b73c0cd72c69cd8d42d3b97bca2
SHA256bc7aec43a9afb0d07ef7e3b84b5d23a907b6baff367ecd4235a15432748f1771
SHA512d5227d3df5513d7d0d7fb196eef014e54094c5ed8c5d31207b319e12480433f1424d49df759a7a2aefc6a69cef6bf2a0cc45d05660e618dc2ec9a2b082b7b5f7
-
Filesize
2.3MB
MD572479b43409247e7e1d63d71db7904e7
SHA177843926e8c76c03bdced3aed3092a2d732bce2a
SHA2562299d9c13b57373a74c57257c1394425ce8e7e460ca424eac71fda12c2fa4de2
SHA512e62e61f3ed4ae5b006d0da9eef5085ccae8efe48f5b74e091702f5e2cf01415b7e70c4c2cc1b0814709bf2fe07556974a4084c36e7a09b63d5fcb1e82aba5ecb
-
Filesize
57KB
MD590ed4938fd712e3ac49dfdff0ff63cc0
SHA1f3ae0ec59bd8fcb578310942bbf17c047d4895c9
SHA2569d3eee64d97e0b082a2ab26f997b29fd6f16bb49a70b711fdc241fca079c788b
SHA512c35ae7a402a01155a9aca294ee88a4029eeb2c560c25a33acb3e35d7060f8fa02d6bc0289b6cf44ed4e516cbd21a7c7b0843172d2686dc3a7270f40be08e0f70
-
Filesize
125KB
MD5b0bcc622f1fff0eec99e487fa1a4ddd9
SHA149aa392454bd5869fa23794196aedc38e8eea6f5
SHA256b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081
SHA5121572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7
-
Filesize
392B
MD505a69d0383ba77d65c285f9a71217acb
SHA1ccd2c783eeeef689745b598897da482319c8f528
SHA256cfcef5a116ae4c61c1709da64f3491f691ba2cbddb5549de5ed74e1fbaf02dbc
SHA512b1574d1ed66d3d98260dab5dc87396a01d7186131ce99ed2144ec5e77dafd833f5285b6392f372a62e5b19673662b5f2a78d7a30f3168c3750e34e7acf990554
-
Filesize
392B
MD548bf6f9abac2e3875a9a3a28b4c679a7
SHA163b9fb9880a61dbc8e877145408aa5acf0c8c1a6
SHA256dfb3d28a8f482fa4624ca4339d9565e1ffdb6e08cb0f283a6af7e6bf1fb6047b
SHA512f0a431d841e8f253c86b90705a115cfdd2565732383c10e49c44c6bdd0b3b97adcb570eed96e50b979c93a1bcdb000a5df889837255c0c7058c30862d98ce878
-
Filesize
392B
MD56a3b608a38f9bc2c9896c911d0c603a9
SHA1219b38bc991132e921c624608c4a5a903b643da1
SHA256030b7b53101c4078153dabd80fd28eb7708e8a783902a1903b2a439db9b0b18c
SHA512f7efde22ddf6f4d313cef6858bc2bfaa7d7fe7a9218bf252957961de8fbe01f9b97334124b5fb70c2c21cd5a1ae1a5b90d8c9c30218b795d8dad77a2f0a76658
-
Filesize
1KB
MD56ec54879294ebd989521082a5ccf3a6a
SHA1914a0995b4d35d93fd15d4da21a11862a33b825a
SHA256837739da1a519aafc12d9ffddac6ffcb2719fb2717fca13f4f3dd213a86ec597
SHA5127aa77e21892f98bc08fcea917f342c10e588e5b54113ab6002a68a5392e18b6b983b65eebdf7d0635c2da0b99a2d09207786cfe4ab5f4513c983f7e3d6af50ad
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2760_1411823227\03b10fc1-b1d5-470c-a9d7-5f5db103cd42.tmp
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
7KB
MD500e0aedbf245216f24d66f8aa38f04f5
SHA1435855bd8c2cd4c20f62a5dd1f6a51a49f29e225
SHA256dbe987b33283c7c8adbef661bb17331bcaf057e84c823e7fd922711219863b93
SHA51263eb66c92edea99f1a08fa1bed594010ab47abf02d6ee57e8f7c81e70381ccd0a36a9b8011a501a8b9b813c3552f97594a2d404bc38e3684a5e7926fcbc6fa6d
-
Filesize
20KB
MD536affbd6ff77d1515cfc1c5e998fbaf9
SHA1950d00ecc2e7fd2c48897814029e8eedf6397838
SHA256fccc7f79d29318d8ae78850c262bac762c28858709a6e6cf3b62bcd2729a61e3
SHA5122f29de86d486db783872581a43a834e5064d1488bc3f085ddc5a3287eb9ee8a4ce93d66f7b4965cafb3c4f06b38d4b0fcfdc0fcb1f99d61331a808e5d6011808
-
Filesize
20KB
MD58a774a06e56bb3702f3817f8370341dc
SHA101bed8066e06ea49cceb08075606d056857af463
SHA256c51af697cdc15085ba15f7d820d3bd6f67e9fa54aff202b6fe6b1ad56894ad7d
SHA5125ecbf6f0c87a8c2ddb0a36725c37af94210cb158859c25bc73ffeb1ca801942982bc1372cced932fc36ee951299b7d2c2cc71ed28b620a46915d092902839ce8
-
Filesize
143B
MD5a454600b593ebaa5855edc0f3275a19c
SHA138075a716dbacde0767794310142095827badad9
SHA2565f9abb020ba69d8660f86ac0e6b157106fb4a35f9529a4c267cddeaaea59ce73
SHA5127084b064c12f60d668d97620b425bd8fb4ab3549e21c0679e740da38b625dea5a6ee3b18844cedd94efd489a84dbcbccc5eb52a7ac025d4e727f5fcf025a0af7
-
Filesize
9B
MD5ed5602cb0540d203f85998db92821f1d
SHA16090ee19d2e0d2fc3c65cb0bdf8242abc849ba9d
SHA25639dc0aa1c73f37aca1528e6b1dbece97e523cd1324e9b577f5dc5e2217197868
SHA51214fd93c45a129a88defac989f01df8f4a25580b83ad6b5eb5a9d1d28f6a6c68f840b2f6c71ec77558f8d4f35f8fc3f8ddcece19f3b687e40f396b153b4f79746
-
Filesize
4.3MB
MD5fd30acc7a696c32f661b33668e73bf7b
SHA1bd18409cfe75b88c2a9432d36d96f4bf125a3237
SHA25697c260d35bcfe18e046a1c413b9fc5a2754b8f790f7ace669a3be2500c0df229
SHA51262a0539d3f299698e0c595ee745cee439ed2180a7105182e5417c17dda3dc23cf74babe3bcc2fbafc6e331eaab88c5f4afbec4ea67f696741aef8bd4976409d4
-
Filesize
2KB
MD55966c3affb90233dc9495a6937334594
SHA1781b7bf6fabb155fb8ebfa74d6a716d925a2bea0
SHA2565c0bb8f35ab4b2ad77d115239a9d2873d9ec79288a1a5a7a308f36d9883ec87d
SHA5124fb203a3f2983ce6c1cdd6cf9188a2ee85c140e119f1772e60d0b3be7b723a9ea9cbd3ceb07d828051015d3330ce4278c706572922b9d07d29e1eb9046645c4b
-
Filesize
445KB
MD5825f35be190434a96b4ff4220b3b98d9
SHA145b14ff6d132a760118effe39796a07d6791af26
SHA256ff334aab77270fb49930c5edb2bc708ea41fecc8c5458270f965f352294db6d1
SHA5126aaf9ee2b595cb5d67e99f4bcc7415c54a2c8bf00e054357d65f6556425b16ab98213e42148d9cc0f37f606b36b16db1d268bbf61d2c40e7e05ba677e05f81c7
-
Filesize
637KB
MD5d7405094b9f294521fab7ba953c91f8a
SHA1bd63dd3494d2b2fe8fc134f00a7658e1d1423042
SHA2567ea8fa4225742b6c9dc25eb29e14889ee8dd687b61666426ae98bb5b77bbc35d
SHA51286a27f7280ca4bf4d8e1aac0024446251e5e872dab895a5f17ead8be5d7fab8237b1a38b14d69210b6bc1d2ac484f868f70266e1c56d860172ecef0eb9ed644c
-
Filesize
571KB
MD5ee44093c1f8d2f9983d9a480f4926526
SHA1a2ccb54fde91372a2e1267feb442c7ec77ec1713
SHA2564f537ec8f704ae309377d1ac82bd3512889a999918e05b26cea5d5d24ff59522
SHA512222798a40b6077ca1866fc92f2d0ca4cac0d1397e9f9cec28d82729819ad71a99bedcfb5854bcc4922d423b8384b6d4de63871e33ff7e2c45a3b2acb120dfe08
-
Filesize
226KB
MD536fa686b188b7012c1e616ac0e21004e
SHA113c7e0116993d0829f12abef4080bdf29d955a7b
SHA256dd6b7459aff8b29d19164e429b7e4d3b1f331e06191a86a4f12520b8bd6835b2
SHA5123b9223b9ce488d2dc600349fc96accf9f4b41e99f19ac58734548b8afee36691b6f5ae84a338c4432d922ceab32850b6f5036302e4856a3d8d0075b09e8b2761
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Microsoft Visual J# 2.0 Redistributable Package - SE (x64)\eula.1046.txt
Filesize16KB
MD56ac1b4f60e278cab4a62f867ae645b00
SHA1bc217da952f4eb609bc3b5a2a61ebe463f00ce38
SHA2564d850ffd6829db7046231995ef8386858d57511380895e019e17e7b38dcdecb8
SHA512ae3ebc946947df8d8248bc313f194d2498a42464db303a6890720353209ee806f5837ea095119c1e1af15a58ef5b82e458540b00b7e8be973f7b154b5286b127
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Microsoft Visual J# 2.0 Redistributable Package - SE (x64)\jsredist.msi
Filesize6.2MB
MD556d71b76f211a970f9e25a5698b65c4d
SHA13f7aa1012472249f338c9e468c95860657e0e1eb
SHA256655f8db48416ae39b29cf7a6f06bb1e5140751e8b19f86ec158e94b30f33c278
SHA5124a70d425e8cd3dcf67241699549f6c9ed9615bddc265c32b3137f23f119bf40635319256999f9004884aa4eb675a03bf13940fffe6453e15fb395fdb4c364e78
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Microsoft Visual J# 2.0 Redistributable Package - SE (x64)\vjredist.bmp
Filesize5KB
MD506fba95313f26e300917c6cea4480890
SHA131beee44776f114078fc403e405eaa5936c4bc3b
SHA256594884a8006e24ad5b1578cd7c75aca21171bb079ebdc4f6518905bcf2237ba1
SHA5127dca0f1ab5d3fd1ac8755142a7ca4d085bb0c2f12a7272e56159dadfa22da79ec8261815be71b9f5e7c32f6e8121ecb2443060f7db76feaf01eb193200e67dfd
-
Filesize
78KB
MD528911d5c6dac59dd7263ba70f36c15e7
SHA1707b09f3913de7078239008593968661f810e6d1
SHA256f2e439b1b4a9c99fb130bc8219dfed6f239343afec637b04d0115bd97817f081
SHA512195d2543e9ed290aed166174a2fd7a85ff1bfdf657f22e1e8e75934490e9ff352cc5d7364928264635648c71eb36474220637b443f2520b0cb77e59b5a36dc1f
-
Filesize
47KB
MD5e0dcfbd054b5b0b16d7fd74a396b3649
SHA156024ec3415a4f459c754c6ab54721ea90313e85
SHA2561d84638cf6c365451bd5e254b852d58e4236d2e623e4f4f8ba801d3ca7593366
SHA51252fde8e2da8028dcefdf2f7479db2d2c41d70a3c421358316dd3de685d8445ec01d6c131fb0ea35369e64f47bf101eedc1411b4b743e00c194193bd38aeb44ba
-
Filesize
7KB
MD525136ad6d0466c3e7a10d4220eabc220
SHA10552b73b2b19a5f2d0e86827ea2db9eb8e619ad1
SHA256bbabb7e1f3d738c676b7e53459dffc5774b67966d3fc1d9a8c23d748a03ed5c7
SHA5126c33ee7e7a6bd70e532bf4239f38d0179d6cc1f16729980293a97c0cc51366f92e22e8497b5f2956115beab8a0fa0ecc8949cae88a6c444ce59be12a4b8935f7
-
Filesize
5KB
MD5a4c0cead847b0b50c558e302ec8ead2e
SHA1e355c5f12bd15ca87fc5021388363173da658fdc
SHA256c395424f342f890746569bb3751a8701cdefc5da288af6d1f37ce10451cfba0d
SHA5123ef3e8c041c0d7372c18d03fea539c09ed6d6b3c98c9ec8b408da68e4e5a1731638b1dd00ed3d530eb018a383ee3d6a0d042dd803999141a1716858554effa51
-
Filesize
36KB
MD5415b167695c4b5960a13098622ef3d80
SHA14b641c86eba8b39321979f488a83307ebfa896ab
SHA256e68ae845a6967e68fb22eb0f4d95631d041da906801202f7662b22ead34b2371
SHA51222fd2293fc074f8b26cdb37c158549df1cecd2c41e1d016e1678bc4ab7b776ea483172c4eb01c0bed973964867bdbc611f27689c3ed41e70673eb88b0e971c49
-
C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\9C7FD82D9F028E67151F7A1CD5DDDF8A25550C81
Filesize1KB
MD55da5c54604208998c5cad19d8dcdc575
SHA17bd82675820b24244a8c309b6a5706f2d3d1c6b2
SHA256053ae46937144207e9dfd5a08ee62c827dc1588d2ac08224a6210d4ed47e5716
SHA512541b594e66f5e79564ce6644c9782c3641f3946a8ba99bbedf2c288a88d5ca9eb40811a18a34093e095e229d75a569a2b131fdfd41cd8ec63eba18988307f9db
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.3MB
MD5ecb2a7af50f9961d0dfd1381015660b4
SHA1120a40a28c7e4a333c387f95712ce137400ba367
SHA256d530c63416f12df760514d0e7f0acfbabe74e66b4dc923d6d8ce060d62aa7a03
SHA512527c27ff228ea30444297dee6f268165eec146724467e231605e482711daa5737d8f4d13c9c197f6a96f97f9e56abf0baae6bc6828f23c568632a1185e6ec773
-
C:\Windows\assembly\GAC_MSIL\Microsoft.Build.VisualJSharp\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.VisualJSharp.dll
Filesize52KB
MD565966dcb7cd214a691c6952e7a703830
SHA1681344a031911a19981374569f4b3857190b31d5
SHA25648bd1636a5e8f7c5f32e78a7112e7e349ccab64a07c27062b54dffcd62211d5b
SHA5126f1b6b6fcc13af8634559d0faf91680cea9064b63ae561a3dbbe3a076ace03447c608ff7a5a766e2af23e453942af4bdd1d1ddc3ad1de94c9470174b13b99e46
-
Filesize
16KB
MD529bccc03213be260b689f7800d5639cf
SHA1efdea10f6c646dd6df49c0fb34d6c29e7dd788d2
SHA256a84a7130a7c6da022f768e28ec41c12f46d589359899ce7625e077b82428912c
SHA5120fb440ad1c5d226c4d237125f0e4b52b99f74887732a1697c77babedd979eb81bcd2fe4b039fa6bd5d1f12b3a9a16e654cbee269bcbf417f8918c4f1fc4a5f3e
-
Filesize
12KB
MD55ced4c13755e35524f17abae2fa81943
SHA1c8d85630ca3f2fa1ed2119e5963079fc71ab9a4e
SHA2560f55b197cf3b97332744949fa6a77c660ffe0c3d982e4c2fdec3a192d54d2965
SHA51278eb8259f9286472674af293823f760c23c3c6514c78bfa80d51d02ac008edacbc239b35f1404cdec074db47a43d70257c366d4cc73160a670bd2c7b475b530a
-
Filesize
36KB
MD5bacdff866ba2972ba32dda3e0604d6f3
SHA1fddef679b001ef18225bc1fbb9a3fb02e97bd268
SHA256ff58efa5def8ea1f459a980557907ef9477c2cb6f5e3b9c21e5bb754b1c53ae2
SHA512bbdb16f57bcd151d263b5b0b2e232be0afab2b6ad782b8665a881ff4a26aa3f90666a9442414649355468532bfef197dadf364f99c663577d77504b7e8f6e947
-
Filesize
52KB
MD52695edf4757ced541912ee0ad7afec1d
SHA1354a24868ca3096339e299fce399d7656b3a9b2d
SHA256a0cb4aab12d30631fd12dfb7bbb6356c9d0fb33bdbf5573175f73d03e99b5c00
SHA51222135b2c8203e264075f2834a3a6ff814286a0115541762fa3129abef41ce61d2051392c7260aae37f15f61834c7fbf555377e5d6d0e3cca4a0070ceab5619cd
-
Filesize
9KB
MD5b3bb781e46fa05786867325731b8c79e
SHA12c151e555375da751ca222764ec798388e674ec1
SHA256484864b45c24b440ead9d88aa7992eefb4230dcee5ff166c27f838a8295585e1
SHA512f7e38ac9fbb5fec0f29b0df7d355d29de1463599d1fdee7bf0fa1baa50856d230160ec39ca041c942840c09b9efd382f345fbb36477107b0342e3f23531f3ee3
-
Filesize
56KB
MD50c1c0567c65ba0e341559ce4627ddb1a
SHA16c75d2411fb0574c0b294dd9ba0b0cf56d757929
SHA256d5069a0f38115b238cf51a48ba88986595298303561026d3ea819201ff1ebcb5
SHA5124e31ed9cb85b87228a61a65b33cb6445b4f21ad8448724d3db81af5bd9749d7cd2a1239789bc68303a8aa42df4b99593177dd3b211e6efb4c91e19507bf6d1c9
-
Filesize
52KB
MD595faa4c1c01f1931445cb15d48113195
SHA115917a3adea6251b9de19736bd68c9c6d34e16a1
SHA256b7a1c577dd0008eeea305f75286405d8229f12eefeffe381ef4fecf9ba171b08
SHA5123d65bc484c71322bd63e4e947e929d5d6c16417f64aa19fc66be0dce6f0565ecaca264829d476ea7c635af166e1a6d2a06cf2306894a5b9fa6ab0a727e660549
-
Filesize
16KB
MD522040a780a316a312491f9600c2bfaf8
SHA1d5f4267fb8de158927b29b48b8bc8ca2413a2401
SHA256d087af8ca5fb69da74306131fd6c70628a2872f3f0244a8fef1216c3fddb2bec
SHA512ab692ca0f44adeff1c8f0d22efb4c5a856f8dd6cffc6f575d7d3aaebe05f8c9ae44cd56dad19cec303523237c8f0e6779076ecef89f6f497ee64cd02d31a9ae1
-
Filesize
12KB
MD563ea75798bc8cb1f5e1c3e0191c8ad19
SHA1eee6476e4973aa438e5d19677aaa3d428e21f40d
SHA2569d18f7b502727209aa6acc5830f9b24f16e61584fa695425b405202e6ff5ba99
SHA512c2018433ca205087b5c735f94056bd5587e3eeb5565f307a579e026d689265234f81df36d368a867ccb9267d7884a45b3f958e1581e766dd6163c7a4334a912b
-
Filesize
3.5MB
MD5224f2bfacbb069b97ec0fd113457c99a
SHA153bea87408ad073d708b275038fafc995a0780d6
SHA256bdcfeaf9ff86ccad3487c5943b5bcc71cb9d1a2e5c53b9e3627302e88d006b26
SHA512d1bccef13119dd4fc1a4bfd610d7feb42c3c7691963deb0334be0b64aa48111f3cb3a4019fd996b2b6a94ac0166044b42a74afac319d2d9a92fb1d5e9e9cfc56
-
Filesize
3.4MB
MD50c290459ed6dddd3a56b6576b0ed568c
SHA19e7fdb55964c6390cdd2dddca456a1e595ec46fd
SHA256a1d8cf17c742a61a4c520a7468be94dbec8171317a4cb6e13d996ab78aa0c8ac
SHA512754796ca54dd1c3c6571d3e4decf920d9652ce394bd6b3e47cbc8d37480314653ddcab08dc146b8143551cc418d85418fcdc7f34b71702ea28752bd56a55bd3d
-
Filesize
28KB
MD5153283dbf0baa7b5bd3722dd942cc3a2
SHA1de9208dbcd736ab8c65849c01783c972311d8972
SHA256688f3eb87f07f041b160b9c03f21a4db3f0a0bca560536729d752269a6de7416
SHA51204361624e84dff2920ff291d5617cff9851881cb735afc110bed96006e458d16b0851d72bb34116e4311e0fd5afc994648ed23499702efc9b3c90cdb153139a8
-
Filesize
28KB
MD502857e4c4c0fb3a9c65024c7aaeea441
SHA125397edbed888a5aa7bd7d0c0accf83bfcbc2375
SHA256f038d110d3967ca0f83d32f98c8e7c422e5a0f27a0bb38be77da077c9fc63db6
SHA512816f39233317ab5317d09ee6cb272dbbccff465bc81a71f713094ce1ef8be21a52ae5b5303a7983e2324b9502d84c86644e6fe98025d88f0d27194355c525d4b
-
Filesize
904KB
MD5115c51087bdf000055c843358be4afac
SHA1cb6fee37b8110e7606f133d06fab312b293bc9e6
SHA25644f03af28d075204b633afcd3ce845ddc4eb96edb4b9cdc311d22b3e13206b1d
SHA51222285f4ca5863d1b4fc7880da16f3f852473b97e6f3a28526b48f72f01dca803388d4b4f01dcc5fb97e440b1fe692a7f0f41d2c988591f123741bc149b9ce558
-
Filesize
900KB
MD54ae45afca4105fd7114e3f04eac3851b
SHA1bf15cc756895d533dcea615ce15f8afcc4069066
SHA256d8fd2643d2d19301aa83c4baa3e7062795e36344307429baa63c2fd92d37c10b
SHA512c42e4e1cf7d044af5011f89904370e61e2af1c611e13e5ad15185f6728ff75fd717efc4f9f0c806c36bbcef5576a110de279b623436d277532b3a32149aea1b0
-
Filesize
36KB
MD5ed5ea273bfcebb5856ab0a3f1d5a7580
SHA1a1ffe67267448eedc0e90c1845df4b5beb76a917
SHA256ca8ba8e4eb56d712fb00489039548846f0f4e6238f0a5daa94cc8bebc53e0ab2
SHA5129160e76305c52dc90d2999af95ae240f2e0f8ac25b33e69a74b85cbb3a11177cbece5a593f649a209cd4f1bc7577ee7a00a3649a7fd2807a7833d4707afe7713
-
Filesize
3.3MB
MD598eb1c2064ee7d72f70f768b4faef0d4
SHA18ead08d3643fc450af299be2b1e82ff4264bb19e
SHA2563c2133f77fba72f6c206fdf13e59689c072225a50100ec8f0b280cbeff356614
SHA512d9e33569bd53e1ed5910da3976a4dc2b1c4be639f41bc850857fc1be7c447930dfdbd093fb4ea3f7435a32b3d89d1affeaab4911e0c8455ba6d42511e2bf1110
-
Filesize
181KB
MD599f3a420151378dd3c7d04956a6ee997
SHA101fb83a5ddb370c66acd5a3035c1d370bf012be7
SHA25612eda741bee7e8562a69e0c1cbe76b879770d740f98602eda7f5ee6b30e9badf
SHA512f15e2b632c8169aeb070683a7c35c508598073608574483b5783f0746fd813bcea8d0edc14aaabc7faa1ae14e41228893e4cd94a2966424f22ac9fc5b99a4fcf
-
Filesize
1.1MB
MD5dcf8ec28727125c034287613b85c3238
SHA11be87b0abc2ec2cc5c9a87a17313fe78fbfc98c1
SHA2564d6d4344dab65bf7b94a3801b04b692a1fc8bd162f777df5f52ce35dda948f33
SHA512a3846286e203f4601802c3c74ea8bfaacdbc63ca632cfd9874b8d7a5741167b90847a2f675b3e1493867011f0b13589a167ab6ee4f9cf9915d2e98471c3d33e2
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
Filesize3KB
MD522e796539d05c5390c21787da1fb4c2b
SHA155320ebdedd3069b2aaf1a258462600d9ef53a58
SHA2567c6c09f48f03421430d707d27632810414e5e2bf2eecd5eb675fecf8b45a9a92
SHA512d9cc0cb22df56db72a71504bb3ebc36697e0a7a1d2869e0e0ab61349bda603298fe6c667737b79bf2235314fb49b883ba4c5f137d002e273e79391038ecf9c09
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize1KB
MD51c926ffdde8e1ccc983154a6509a2cb6
SHA104b1ec96a06d9a960044daea144bb970bd3349be
SHA2560b41e22e20a1527a992d34df2825c0bad75fda572630159f11068447f1ba32e5
SHA512f6b97ee93789e901a17039d61c191dfaf1f72cfbb47f0da1dbecd2f2fafe637e552da6172d85c4c5044376591d17b3f19177cb8dc24a25519b5c9785c59f93bc
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize1KB
MD593158502a5391fb4e58e7f61d5fa7738
SHA19057a34a3a0258b8429022b59e715db750a02a40
SHA2567874f368d74d7f14b57c3d492c6187dcf5c0474b9977c2f1880c8f03a8553bc2
SHA512efef22faca152be0f2750bad4a1ed8dab1e7f23cf87f1c81b807b99c7f7ffab26f7550f8c53c6069d194ae64b7118d98cf2602bc965d626a88c36241470a65ff
-
Filesize
9KB
MD5162fc8231b1bd62f1d24024bb70140d5
SHA17fa4601390f1a69b4824ee1334bee772c2941a24
SHA256c68a0fd93e8c64139a42af4fcd4670c6faea3a5d5d1e9dd35b197f7d5268d92b
SHA512a707b5ef0e914ba61e815be5224831441922ed8d933f7a2ffe8aecf41f5a1790a1e45981f19d86aa5eab5ea73d03b0c8e2ab6b9f398ab0154d1c828da6f6beda
-
Filesize
5KB
MD56fcd6b5ef928a75655d6be51555288c7
SHA1eafdcc178343780b83f1280dad9d517aaedab9e4
SHA2563d45f022996cd6d9ebb659a202fbfd099795f9a39ed4e6bbd62ac6f6ed5f8c7b
SHA512635ba44d8d8ecfbdb83a88688126f68c9c607e452e67d19247dfe7c307c341dad9b1d2dc3eae56311c4b3e9617ab1ee2bd2a908570df632af6de1e1fa08bf905
-
Filesize
1KB
MD50a6b586fabd072bd7382b5e24194eac7
SHA160e3c7215c1a40fbfb3016d52c2de44592f8ca95
SHA2567912e3fcf2698cf4f8625e563cd8215c6668739cae18bd6f27af2d25bec5c951
SHA512b96b0448e9f0e94a7867b6bb103979e9ef2c0e074bcb85988d450d63de6edcf21dc83bb154aafb7de524af3c3734f0bb1ba649db0408612479322e1aa85be9f4
-
Filesize
841B
MD5f8f6c0e030cb622f065fe47d61da91d7
SHA1cf6fa99747de8f35c6aea52df234c9c57583baa3
SHA256c16727881c47a40077dc5a1f1ea71cbb28e3f4e156c0ae7074c6d7f5ecece21d
SHA512b70c6d67dac5e6a0dbd17e3bcf570a95914482abad20d0304c02da22231070b4bc887720dbae972bc5066457e1273b68fde0805f1c1791e9466a5ca343485cde
-
Filesize
71KB
MD512c90dcbe3990439b30a1750d7d6a838
SHA1fa0d6dd105a694260c42c9ca96e08b33fec76fc9
SHA256365555c74e0d81b0ae886b229810512171644d8985b7e56f4f60b777ec893fa8
SHA5123231e8c3b1c2ec9f261b1981fa14edd5d0d28bc3d065e9523155d3b26c3fedc56a0296d2d29cd734bd06bccd1e281020bb702615baf6ce9b08844e8e1f3934f6
-
Filesize
90KB
MD5de3591fbd976bbc0006e09148b345059
SHA13a88b08dc00946046d82872e87fc88911a2d73f2
SHA256a4ed9ad6352cfa6accccf50dc103f6bde4e8d78367ab8f0ef17c497b2d6c6030
SHA512764570b4ef2df43a7b9c08aded845bae381f8aecb0f6ffe0bbe7d64e72e0c9710d6a531d0ac28cf5c28816d60824f8312fcf1d6978691996d2e82ee98063284c
-
Filesize
85KB
MD5267642394c0d8b1c9a2dc279ce21ef43
SHA1b69de3e259c264f0650018c6fa3bcc1ccab5bb2e
SHA256597151959d4264234fa25ebe470516125d36ed57c13baa1df7933b4019b3f314
SHA51265b2b62960a023b5010ba697f7eebe7bf30744c6214cb39f5bf0d283336c9fb6323779ab041dbae43dcebb183ddaab7513628494c486b90891e611159f2529a8
-
Filesize
91KB
MD5c4edff7bc690871dad6372fe82f1818a
SHA131938b640faec058767ed652c0e997d44fe423ab
SHA25666515bfcf8398a5abc7659ec8ef42e9b0de5db0d1f8147aa5fde5169d41b23b5
SHA5123b04c24b030bf8dc9025d668548ad3318f9f379eeca1cf4e3a91a4887121bd2a668e2a643bf9880202e086a720f3d66431ffa029ca3766313246618689dcc3bd
-
Filesize
89KB
MD5e154e908fea2658dd8e68b85f1d12c9e
SHA18dc6a5ffb6e96c7ef52b610895ee1ae7ebb9a1ea
SHA256d2323ad38dc863226c4fc4b0ad49a621100e96265ba17c361603a613f9a8faa1
SHA51240f2a7825784ec32ccbe12677853ea4e979946e29dfede23f363ec93a2ad172345d6139cbf43df9b4abd86e482341982ff605babdd62990664170f0021e611f0
-
Filesize
76KB
MD5cc764b52a03340e5291b6c6a00eb6726
SHA1e099cf148a4584502a106c7746caa0797d343d69
SHA2560aeb96829c7350da4519de3667a0202b8be83f6236bd10ab1f3960426eba4ccd
SHA512677b0a2abc5867ee06605cab9ea272546e975f85bdf7d68a2e73e593ae5513d271289318f1fab2e4313e9b3a5e029b00379db1d164b0d5d026de2ce211321aec
-
Filesize
74KB
MD50cf1ce042664ed53231a1abd3c3acd4a
SHA190f17cc1b9d2765d61d7b7488b180661460ea7da
SHA256d1871469703578f35fb770f295d705ed54e2257ad4daf8cc319d15d4792f9723
SHA51294c4a3f95ccdaf556560db9b97253d3681f73d85dd5019ad0413f7719c1aecf0cc8c08fed0c4470fb93b2acff208a1427787ce5bf6761208cb8a4d106f0c06c9
-
Filesize
87KB
MD5bb8cc77eed188b459ad376a2fe755acd
SHA1be984ee3091dc7e3800780e3dc95131660b8be41
SHA256aa4b5c8c52df5482c9c9c51ea95fd0408da5856dfa0da24363c03d07dfab72ee
SHA51260d9c6a867837f35219fac38ff192f7cf2529b3ac3d189e1f189ae8ce14d126cf0628b708476403f152e3122e5dc82dce404dff94d6ec7b212c7bd8bbb2795f7
-
Filesize
70KB
MD537937b4fb2351a95704982b0b4af6088
SHA1c10adb8f1d19318ab3f04c684c7aae7562c4dd15
SHA256d949ee3b60bbb5037d7ad3c196cb7e195e9936c0f26f3a11cbf51a9b8e38b32f
SHA512a338608e9d746a23086f0d4c479c3126d4eb2c04cf87a6e9789ecfdf657a4229efd5577ee6933ce73648eeb607c7a8edc8540c25b851036a71a37f6b63726819
-
Filesize
90KB
MD5492875bc841bf1931070d31b748c58c5
SHA1591aa5d209a210b53fc0ab6ace1add3fd7cf6ef6
SHA25685dc1c7dee6436b4816b3b853b2d16ae8615eb8378b2f2ebdb9187bd49ed7294
SHA512dfeeeec046835733fe4956fc92fb7dc8bd24f3386224a3ec17e0f7c44f97d41145fc6ca254f0fc5ad08a0655da78dbeab0e26346bc504a427cd525f25a2d5804
-
Filesize
218KB
MD5e493a21c57d160f4fa023c63145fe580
SHA1f57a601c422201ec70650afcd987c132bef26d52
SHA2562cc196bed01619b5498a974c19cfcba6a04b7746e84808f06d9e4de3129ab4db
SHA512a503f221de3b61aba7aa69e09382e7167dfb4246e1a31884b3381713e50b31b4b04088204b9277208f066127d8c3962b3351b3da1a6f52be3776cdc357d76778