Analysis
-
max time kernel
899s -
max time network
879s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-01-2025 19:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/gfNWfa
Resource
win11-20241007-en
General
-
Target
https://gofile.io/d/gfNWfa
Malware Config
Extracted
lumma
Extracted
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Signatures
-
Lumma family
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: [email protected]
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SDE6BC.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SDE6A6.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 37 IoCs
pid Process 3324 systeminformer-3.2.25004-release-setup.exe 5472 SystemInformer.exe 5884 winrar-x64-701.exe 1088 winrar-x64-701.exe 6108 7z2409-x64.exe 3908 7zG.exe 5536 7zFM.exe 6064 7zFM.exe 5160 Setup.exe 1608 7zFM.exe 820 7zG.exe 2824 7zFM.exe 3808 7zG.exe 2908 7zG.exe 4792 7zG.exe 5904 7zG.exe 3552 7zFM.exe 5868 ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe 5480 taskdl.exe 2932 @[email protected] 3504 @[email protected] 4852 taskhsvc.exe 2452 taskdl.exe 848 taskse.exe 5536 @[email protected] 852 taskdl.exe 3000 taskse.exe 3624 @[email protected] 5456 taskdl.exe 4588 taskse.exe 4384 @[email protected] 6128 taskdl.exe 1644 taskse.exe 4872 @[email protected] 5464 taskse.exe 5068 @[email protected] 3808 taskdl.exe -
Loads dropped DLL 31 IoCs
pid Process 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 3908 7zG.exe 5536 7zFM.exe 6064 7zFM.exe 5160 Setup.exe 1608 7zFM.exe 820 7zG.exe 2824 7zFM.exe 3808 7zG.exe 2908 7zG.exe 1676 MsiExec.exe 4792 7zG.exe 5904 7zG.exe 3552 7zFM.exe 4852 taskhsvc.exe 4852 taskhsvc.exe 4852 taskhsvc.exe 4852 taskhsvc.exe 4852 taskhsvc.exe 4852 taskhsvc.exe 4852 taskhsvc.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 5384 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bqvuhzmmkvuc835 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\7zO0ED5A582\\tasksche.exe\"" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 107 raw.githubusercontent.com 408 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\SystemInformer\plugins\NetworkTools.dll systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\7z.sfx 7z2409-x64.exe File created C:\Program Files\SystemInformer\ksidyn.bin systeminformer-3.2.25004-release-setup.exe File created C:\Program Files\SystemInformer\plugins\NetworkTools.sig systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 7z2409-x64.exe File created C:\Program Files\SystemInformer\systeminformer-setup.exe systeminformer-3.2.25004-release-setup.exe File created C:\Program Files\SystemInformer\plugins\Updater.sig systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt 7z2409-x64.exe File created C:\Program Files\7-Zip\7-zip.dll 7z2409-x64.exe File created C:\Program Files\SystemInformer\plugins\OnlineChecks.sig systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 7z2409-x64.exe File created C:\Program Files\SystemInformer\plugins\ExtendedNotifications.dll systeminformer-3.2.25004-release-setup.exe File created C:\Program Files\SystemInformer\plugins\ToolStatus.sig systeminformer-3.2.25004-release-setup.exe File created C:\Program Files\SystemInformer\Resources\icon.png systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 7z2409-x64.exe File created C:\Program Files\SystemInformer\plugins\DotNetTools.dll systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip.dll.tmp 7z2409-x64.exe File created C:\Program Files\SystemInformer\plugins\ExtendedNotifications.sig systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt 7z2409-x64.exe File created C:\Program Files\7-Zip\7-zip.dll.tmp 7z2409-x64.exe File created C:\Program Files\SystemInformer\Resources\PoolTag.txt systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\License.txt 7z2409-x64.exe File created C:\Program Files\SystemInformer\x86\plugins\DotNetTools.sig systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt 7z2409-x64.exe File created C:\Program Files\SystemInformer\Resources\EtwGuids.txt systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\7z.dll 7z2409-x64.exe File created C:\Program Files\SystemInformer\LICENSE.txt systeminformer-3.2.25004-release-setup.exe File created C:\Program Files\SystemInformer\plugins\OnlineChecks.dll systeminformer-3.2.25004-release-setup.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 7z2409-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 7z2409-x64.exe File created C:\Program Files\SystemInformer\plugins\DotNetTools.sig systeminformer-3.2.25004-release-setup.exe -
Drops file in Windows directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Installer\e613a1a.msi msiexec.exe File created C:\Windows\SystemTemp\~DF2D1652D3E53FE1F2.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF823AF990669F0B35.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\SystemTemp\~DFF72B9898829C7E8B.TMP msiexec.exe File created C:\Windows\Installer\SourceHash{151028AD-E0D2-409C-B3EC-8348C68EAD59} msiexec.exe File opened for modification C:\Windows\Installer\MSI3AC6.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF17F38E22A70DD335.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e613a1c.msi msiexec.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Installer\e613a1a.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI3B63.tmp msiexec.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 4 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\7z2409-x64.exe:Zone.Identifier chrome.exe File created C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe:Zone.Identifier 7zFM.exe File opened for modification C:\Users\Admin\Downloads\systeminformer-3.2.25004-release-setup.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\winrar-x64-701.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7z2409-x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskhsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminformer-3.2.25004-release-setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Checks SCSI registry key(s) 3 TTPs 29 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters SystemInformer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ SystemInformer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ SystemInformer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 SystemInformer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 SystemInformer.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters SystemInformer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 SystemInformer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A SystemInformer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A SystemInformer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters SystemInformer.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SystemInformer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SystemInformer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 15 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133805793147608584" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags OpenWith.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\DA8201512D0EC9043BCE38846CE8DA95\Version = "16908292" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\DA8201512D0EC9043BCE38846CE8DA95\SourceList\Net\1 = "C:\\Users\\Admin\\Downloads\\" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\0\NodeSlot = "5" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\DA8201512D0EC9043BCE38846CE8DA95\PackageCode = "B4AB02668A9198D4CA5A20A62278677D" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2409-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\ABCBC521D000113428DCA4ABCB7D434C msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Applications\7zFM.exe\shell OpenWith.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\DA8201512D0EC9043BCE38846CE8DA95\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2409-x64.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\DA8201512D0EC9043BCE38846CE8DA95\SourceList\PackageName = "9f344057ed2f934b4975bdb0f5c4c7ff86848b2abf0c1c7ececbaa923173acec.msi" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\0 = 5000310000000000255a059d1000372d5a6970003c0009000400efbe4759e760255a059d2e000000d99e0200000004000000000000000000000000000000e237990037002d005a0069007000000014000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Applications\7zFM.exe\shell\open\command OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\DA8201512D0EC9043BCE38846CE8DA95 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\DA8201512D0EC9043BCE38846CE8DA95\Language = "1033" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\MRUListEx = 00000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2409-x64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Applications\7zFM.exe OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\0\MRUListEx = ffffffff OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\DA8201512D0EC9043BCE38846CE8DA95\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2409-x64.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Generic" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202 OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\DA8201512D0EC9043BCE38846CE8DA95\_ msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Applications\7zFM.exe\shell\open\command\ = "\"C:\\Program Files\\7-Zip\\7zFM.exe\" \"%1\"" OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2409-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2409-x64.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 0100000000000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\1\0\NodeSlot = "4" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3587106988-279496464-3440778474-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\DA8201512D0EC9043BCE38846CE8DA95\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\DA8201512D0EC9043BCE38846CE8DA95\SourceList msiexec.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4940 reg.exe -
NTFS ADS 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\1736104523__«FîleReady▬PassWord▬Is☼◄051915►».zip:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\systeminformer-3.2.25004-release-setup.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\winrar-x64-701.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\7z2409-x64.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\9f344057ed2f934b4975bdb0f5c4c7ff86848b2abf0c1c7ececbaa923173acec.zip:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Ransomware.WannaCry.zip:Zone.Identifier chrome.exe File created C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe:Zone.Identifier 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2796 chrome.exe 2796 chrome.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe 5472 SystemInformer.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 6128 OpenWith.exe 3592 OpenWith.exe 6064 7zFM.exe 1608 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 44 IoCs
pid Process 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5776 chrome.exe 5776 chrome.exe 5776 chrome.exe 5776 chrome.exe 5776 chrome.exe 5776 chrome.exe 5776 chrome.exe 5776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe Token: SeShutdownPrivilege 2796 chrome.exe Token: SeCreatePagefilePrivilege 2796 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2796 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 2828 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 4348 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe 5992 chrome.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 6128 OpenWith.exe 6128 OpenWith.exe 6128 OpenWith.exe 6128 OpenWith.exe 6128 OpenWith.exe 6128 OpenWith.exe 6128 OpenWith.exe 6128 OpenWith.exe 6128 OpenWith.exe 6128 OpenWith.exe 6128 OpenWith.exe 5884 winrar-x64-701.exe 5884 winrar-x64-701.exe 5884 winrar-x64-701.exe 1088 winrar-x64-701.exe 1088 winrar-x64-701.exe 1088 winrar-x64-701.exe 6108 7z2409-x64.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 2368 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 3592 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe 712 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3192 2796 chrome.exe 79 PID 2796 wrote to memory of 3192 2796 chrome.exe 79 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 3352 2796 chrome.exe 80 PID 2796 wrote to memory of 2492 2796 chrome.exe 81 PID 2796 wrote to memory of 2492 2796 chrome.exe 81 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 PID 2796 wrote to memory of 3284 2796 chrome.exe 82 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 5712 attrib.exe 4420 attrib.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/gfNWfa1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca2cecc40,0x7ffca2cecc4c,0x7ffca2cecc582⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1796,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1792 /prefetch:22⤵PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2092 /prefetch:32⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2384 /prefetch:82⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3060,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:1268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4520,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4572 /prefetch:82⤵PID:360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4600,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4972,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=736,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3132,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5224,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5352,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5500,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5896,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5484,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=6104,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:5536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=6112,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=6224,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6248 /prefetch:12⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=6244,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5968,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:5928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=6484,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6468 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6348,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:6024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=6676,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6672 /prefetch:12⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6800,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6596 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=5044,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5076,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6648 /prefetch:82⤵
- NTFS ADS
PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6640,i,10917210756306328298,5232758725799461637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4576 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:5708
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4348
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4872
-
C:\Users\Admin\Downloads\systeminformer-3.2.25004-release-setup.exe"C:\Users\Admin\Downloads\systeminformer-3.2.25004-release-setup.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3324 -
C:\Program Files\SystemInformer\SystemInformer.exe"C:\Program Files\SystemInformer\SystemInformer.exe" -channel release2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5472
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:2828 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca2cecc40,0x7ffca2cecc4c,0x7ffca2cecc582⤵PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2080,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2140 /prefetch:32⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2216 /prefetch:82⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:6076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4404,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4452,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3572,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4320 /prefetch:12⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5004,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:5296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5016,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:82⤵PID:5636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5032,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3320,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3380 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3344,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5116,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4300 /prefetch:82⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5224,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5020 /prefetch:22⤵PID:4492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5460,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5472 /prefetch:82⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5480,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5452 /prefetch:82⤵PID:5768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3376,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:6040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5340,i,11363629659281697487,650495249384836338,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4284 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:5144
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1596
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1232
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5884
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\7c8bba2d35d942d9a7dffeaa932dd20d /t 6112 /p 58841⤵PID:4580
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\05601308433842039a609032d4de51ed /t 1868 /p 10881⤵PID:4992
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:4348 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca2cecc40,0x7ffca2cecc4c,0x7ffca2cecc582⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:2168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1720,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=1956 /prefetch:32⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=2232 /prefetch:82⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4412,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4432 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4592,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4328 /prefetch:12⤵PID:6100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4752,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:1824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4380,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4812 /prefetch:82⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4316,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5268,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5416,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5316,i,4920654582915658712,9488771896272732156,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:5060
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2020
-
C:\Users\Admin\Downloads\7z2409-x64.exe"C:\Users\Admin\Downloads\7z2409-x64.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6108
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap23412:150:7zEvent317181⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3908
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2368
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3592 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\«FîleReady▬PassWord▬Is☼◄051915►».7z"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5536
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\«FîleReady▬PassWord▬Is☼◄051915►».7z"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:6064
-
C:\Users\Admin\Downloads\Setup.exe"C:\Users\Admin\Downloads\Setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:5992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca2cecc40,0x7ffca2cecc4c,0x7ffca2cecc582⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1796,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=1792 /prefetch:22⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2116,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=2124 /prefetch:32⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2204,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4424,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4448 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4808,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4804,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Windows directory
PID:1300 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff798214698,0x7ff7982146a4,0x7ff7982146b03⤵
- Drops file in Windows directory
PID:3096
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4648,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4284,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3340,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5300,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:5972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5340,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:6096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3248,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3452 /prefetch:82⤵
- NTFS ADS
PID:6108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3740,i,960940615980829835,3275242582443566206,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3380 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:976
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1580
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:712 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\9f344057ed2f934b4975bdb0f5c4c7ff86848b2abf0c1c7ececbaa923173acec.zip"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1608 -
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap13226:232:7zEvent23978 -ad -saa -- "C:\9f344057ed2f934b4975bdb0f5c4c7ff86848b2abf0c1c7ececbaa923173acec"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:820
-
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\9f344057ed2f934b4975bdb0f5c4c7ff86848b2abf0c1c7ececbaa923173acec.zip"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2824 -
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap5707:232:7zEvent8262 -ad -saa -- "C:\9f344057ed2f934b4975bdb0f5c4c7ff86848b2abf0c1c7ececbaa923173acec"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3808
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap26768:190:7zEvent84171⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\9f344057ed2f934b4975bdb0f5c4c7ff86848b2abf0c1c7ececbaa923173acec.msi"1⤵
- Enumerates connected drives
PID:4384
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
PID:3548 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3496
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding D9179F3F075F00DC0E9880CAF77553DD E Global\MSI00002⤵
- Loads dropped DLL
PID:1676
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:6076
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca2cecc40,0x7ffca2cecc4c,0x7ffca2cecc582⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1788,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=1784 /prefetch:22⤵PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2064,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:5956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=2204 /prefetch:82⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3660,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4428 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4760,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4964,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5172,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:5524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4856,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:8
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5340,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:6032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5048,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3424,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5688,i,10045618708497789680,17451596334945095427,262144 --variations-seed-version=20241225-174432.450000 --mojo-platform-channel-handle=5652 /prefetch:82⤵
- NTFS ADS
PID:5072
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1612
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap31627:100:7zEvent26301⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4792
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap15127:100:7zEvent183001⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5904
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Ransomware.WannaCry.zip"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:5868 -
C:\Windows\SysWOW64\attrib.exeattrib +h .3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5712
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:5384
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskdl.exetaskdl.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 88281736106453.bat3⤵
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs4⤵
- System Location Discovery: System Language Discovery
PID:4024
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4852
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b @[email protected] vs3⤵
- System Location Discovery: System Language Discovery
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet5⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete6⤵
- System Location Discovery: System Language Discovery
PID:6052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskdl.exetaskdl.exe3⤵
- Executes dropped EXE
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:5536
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "bqvuhzmmkvuc835" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\tasksche.exe\"" /f3⤵
- System Location Discovery: System Language Discovery
PID:5416 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "bqvuhzmmkvuc835" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\tasksche.exe\"" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4940
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskdl.exetaskdl.exe3⤵
- Executes dropped EXE
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskdl.exetaskdl.exe3⤵
- Executes dropped EXE
PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskdl.exetaskdl.exe3⤵
- Executes dropped EXE
PID:6128
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
PID:5464
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\taskdl.exetaskdl.exe3⤵
- Executes dropped EXE
PID:3808
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\CompareOptimize.pdf"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
PID:5080 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- System Location Discovery: System Language Discovery
PID:5788 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4961550C3F8003A0A04BCE0F5F9F0916 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D0F5D78930FD68A3720CB6388BF8179F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D0F5D78930FD68A3720CB6388BF8179F --renderer-client-id=2 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job /prefetch:13⤵
- System Location Discovery: System Language Discovery
PID:5016
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3D96CB7AAE253DBDFEE040D42844ED79 --mojo-platform-channel-handle=2364 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B3D10F8DE6EDF98930686D989757F5B8 --mojo-platform-channel-handle=1812 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2AB61B8D5C7B22DC0A9711A94523E71B --mojo-platform-channel-handle=2604 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
- System Location Discovery: System Language Discovery
PID:5784
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\CompareMount.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- System Location Discovery: System Language Discovery
PID:4928
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\c5c8fa0bc8134fc69f49bfadc8ae73f3 /t 4476 /p 49281⤵PID:3436
-
C:\Windows\system32\NOTEPAD.EXEPID:6124
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
1File Deletion
1Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD547c58d098db95cdcf71d60509ebbe41c
SHA15ec1d95c750cf8ca971b47227ac9d60277f57316
SHA2561cfbcf3ea446a038684fe6271fb1123e068f4f84d69a38949a7e3fe947d61dfa
SHA512bc4d0584497ac34f550be2428d95ab757a32012b88692bbd79aab20279eea59aa34489ced51b66ffafd96a3f9d64a666c7e4f420fb126b9ed2c9cc4dc67b525f
-
Filesize
3.3MB
MD5ad845b34379404be8224d2ac570d4f6f
SHA1e197c7423c97cd802d67f944429e83a5bae3dac3
SHA2560c44bc05baec15de76da5074dd96fe19c81f3aa82da628c57555addc77bb0fa8
SHA512abc8d3b9fb90384cf4f2ff73d989227add3aa4f9686a9f7c243f2e52983349bdb92f7b700cbe5f7c27c1867b7aebd1c61f62008145087e47eee58cf2b9aebdc4
-
Filesize
197KB
MD5ca4c4e68d8c6c6fde427205f5378c5aa
SHA1859d682034e9f0db2ca993e0caae4d681ddcf44f
SHA256f51f929054fb3edc65e5ac96562418bd3708c79f4603f9e4704f3841155a8a9a
SHA5128ea22711878efc1f58154c7fece6bdc34cf3e84cc5c3f738ad4227c83ed88c4fea4b4364c7990406b0fff68650bb526e8c53cef2398e3a815d5857dc5bac60e4
-
Filesize
148KB
MD5143fe53bd85147b91249e6ad5bff2054
SHA1766a070925a01aade0b4de633f69e81e6b2d664a
SHA256294aab117eadd0690d8c91fc8e481c9f90e139a6f04995bafbb8c5fb5ec1a18c
SHA51219fcc114ee2b5abdaee1a718542fd95954f4931893cc66747928eeeebfc77e18f247766d102e5785e1651d41cbc726c890709caf6ac488a2f87b3351cea4647d
-
Filesize
197KB
MD504d7da42028698dc7407cd6d4cc18e12
SHA1f1f1bb386884149730a8fc541e8b78de7b139889
SHA256a2a8c32bbcd84c3aa9dc4a1c6b9fa4372d65c5cc7a086241f0db1c0d04695cc8
SHA5123e7579db6fbc1756dae93ae7a48cb235d4ea85fe36564091fbda51d52e359ee6da6d136239d0d97a6e601f95d255f59a89f9a60a02602671db87c1b26f5bfb68
-
Filesize
1.9MB
MD5786e7f050ffbafa231dd1713cbd6944b
SHA12582371a184e87ec9b92f0a81a55693e29dc36b9
SHA2563496cbe28453ff8e0a772540bed2e0923f9245881387bfeb649656365a43802c
SHA512ee139f7d472706dd1fc4444e8e9d3e3103154d6de639120d74b78b1ded0bc0c1ce9fe3b1501673a9aa67ed7faf98a922f2bfa8d0749f3eac1fe8d42181bf8d2e
-
Filesize
346KB
MD5b3a84fcc30ade2b3137cd61b6d4ed382
SHA1642cdd3542f925f262f7d88eac1084f53b5942c2
SHA256251933ff5c561d3d1dcf5774c5ec625ffc1aaf985c776894d286877017b1d237
SHA512e8e46ec782e813254fbe63440a570fced8b26140a84de05f57576e51c6a0d21560b3f6edcde3b1f4fa32d54a47f897de9b3b017d4557b04b6beead14e278fc90
-
Filesize
741KB
MD56c361f0e957ca458f96f5ec3b6391187
SHA19e142eab900edb175e098baccd84d5cf1af61bf2
SHA256ba13c80abd17bdfc65afa2a0c1866a77f9f5ab27e7305e5ba94d25145dbad97e
SHA512c544f2d6238d21ec11bb18d41faadd1a4021e7078659e6b676ac0d2e2f57f211de3363e033f0dde7539f49d1be57277facd5f6c23d39678aacec4318cf87077d
-
Filesize
197KB
MD578a59c0622d45b22237592ea6e58648e
SHA12be6eca7a5838fd0623a0b17f89a89cfe2f2599e
SHA256c04f7f1b5e7de1ea36b64fe932ccbcd7322a041b0ea3a4afee5861e4f87d8193
SHA51252f258e2e28f4ba639758e4fd9e187806862d5bf6def3f059c7239de5ed97050806562a3ad68a747a051b0e47c590a2a3ad683a20fe05730aeb0c8ca591a7808
-
Filesize
402KB
MD540fd464b6b7c6ba8a6956966f96faeaa
SHA1bab8389d0bfa87a40a239c8186836ff037b921f4
SHA256c0ce5d59f4f85a4a1d633ce914f5965a96020bc1270fb248c7da35aaf82492a4
SHA5123e7cd2caa2b11cb6eadb9e7efb58a8b22c6c2e3dab669173782aa99890daa200249ab91de9770c5ebfa75737fec570dfa7fc8ad76d4f0e8e64f4b867c2c42f80
-
Filesize
177KB
MD57ac63abab47528d5fa09b5b1a957c832
SHA1503a3be590d348f9229519685a7d600f911e9ec1
SHA25682489dc1745277939291cc49d854346915ad50605e64c0c143d360a98718bb86
SHA512cb889877ac339f50491cfcf359f1de55c7cdb532b0991e7e78fab01fddcd1db612ecf19000330b890f3c2a76d0a17524c92e787c1ad2e47c1e7f8478e9560c2a
-
Filesize
185KB
MD5b07adf9853eed2ba6b7d0ae604c454f6
SHA17270000e7775389798aa57a34e3e7021325d23ca
SHA256ffbf71c3a4d4b108b6628d62c597bd0764cbdbd8c214285d2d4e399ffad7922f
SHA512765cda00a2f6da9e17f96538916809127c7a59d404bf55b3e3e0005cbe9f23f188681ec1e510a266c67ce23e6aeab03034cbc99866a162d0d32077b6e330accf
-
Filesize
209KB
MD5387b27b32605657995c98a16460934a3
SHA1f6580aad942c7134aa5d54f67fcb7c002f86afec
SHA2569fa7a16a4c509dc6304b8fcb61702dd8d6468341333182abdb9d10d4fcfc5fbf
SHA5127eecaf52c6b553ee641dc5b0b3c0a1fb1ac1419810d851371a4d07f09993e2f543d54243f836849ea6c7dadb7ab4d079fcb1c1cbfb628e0e7892ee80424b3203
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
40B
MD511d253b3a6f1f94b363fcb04e607acd2
SHA19917081d96e0d89a6c6997cc2d4aad6366ecfcbc
SHA25620152f2fc1ca7717b9b858435b3658ce0879f28944bf822210e5ac5e148cc7ff
SHA512101086c8c2805dcb8bb4e2a3c979574fea1cf0268859804c350f05a85945216de51bce90981a11d08c9a7043efee5130ede5c5a376cd86707dcc90c0e4f45334
-
Filesize
649B
MD59aef5194daa46e723dad5999e194165d
SHA143c0713d0b569a11a31a5f294a22188d187940b0
SHA2566f7a13db2b0c9b143dcb8b6204cf928fb6cf6154fba4b3fa38afa34bf5cd8656
SHA5127afc188eb68b1921d4c9e00d15957103ecf669af94b0b851cd1b3e0ce7fb2a1755d0ddc32b21828689299e1405001be1e6a63de11449ddce087917eb8a9e7b36
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
18KB
MD582b03f239b58044f1dc310a32f0f0cff
SHA158184e5e351719ec9b10bee1693260f4f34e37ee
SHA25618a1e3a37e5cb38d38d452d2f0ea83b78b915a507ffa9860cac9c33575a3c105
SHA512884d2835624980f8a8c4eab8da57f93f3b2de8dc4978070d48ce0df355db8a82c291cc8bb7c42703aa55fa11c7180ece5d5bd1877e77ac875fa6155e64576cd9
-
Filesize
24KB
MD5344ee6eaad74df6b72dec90b1b888aab
SHA1490e2d92c7f8f3934c14e6c467d8409194bb2c9a
SHA256a3cf4861c7d0c966f0ed6564f6aad6b28cbd3421a9ca4f60e2246848d249f196
SHA5122a9a9162d610376512a8fae2cf9eb7e5146cc44c8ebde7a12e9a3985da1718c62ae517c25b00de7c0269efab61b4850a0becfbf04382a25730dbe9cf59825a62
-
Filesize
24KB
MD55366c57b20a86f1956780da5e26aac90
SHA1927dca34817d3c42d9647a846854dad3cbcdb533
SHA256f254eb93b015455a3c89aaf970631bc989fe2bd387f79e871b514992359651aa
SHA51215d7127970436f2510344600f3acecc19c39a05f8e82c8a7950095386382b2e2da55883a5a9faa97b84452e67315b9ac1693b6592274c8c1c35c813dfeb543a2
-
Filesize
41KB
MD5b968f9e5faab98f27b0dc2a426057a4c
SHA1987cae3e1b61beeb768563d96a57b9d673306ba5
SHA2562be7c4562ecb9783cd56aab28bfad2929c4222d095369fd58fa9df08c9673709
SHA512ff62c87c466aaba5517d737ecdde5bd5031e3cf998281f6966862269e492cd7c910a5784dd857deda53e6df83aeeaccdd12288fe712ebdb8ed2ae5048f659cb1
-
Filesize
71KB
MD54428f4fcfb59f032684fb30328015357
SHA174658cb3cd89981e859db3574e620af057c2870c
SHA256ae93168fbab94d77ce32845022a86ba49652e9f16c1d1eb42c766636db0f7432
SHA512b3356a0908020f3362554cd9f5b97219767fc818397352439afc75b4565afd2eeb426df164ab4b99f5c0925240453e4924e2fd34214c8f071d02650ea46f74a8
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
16KB
MD55a8f54614f61adc5bac46b79a133be52
SHA147567c916d4441f1c2af670ad98fc9c319acaac0
SHA2562e8519e104ce2c1b195b2d87e3293ea6088213823592aac3eeb1c24375621fba
SHA51248bd89f6e05cfc4274c511f84912d7d56efa18183eb2e6f20e14d1823cad79513618bc2a0f95c8d7d60442af257b93a7ff27b68a328e65ad0e59486256877b6b
-
Filesize
52KB
MD51e0c0319194141b4a70b3889906d77d9
SHA15f01c97d6fa1b2b35a6ebf5137658f41d1a043c1
SHA25628f4794716a099db425bf7b57aa805de69a66ac326bbea5de55e3f2c9a1acb6c
SHA512cba40c6d750d9864679be75aaccfcdc77ad1a6f03925f72c6e2c0a5c53b9e9a9a3c9a833993419a1d167d42f6abecb9f64411b5f2ffc78ab56315ab4ee3410b5
-
Filesize
102KB
MD55fcb2842ed1cebe048773adf0cbf5e22
SHA1d244d9ba547e4cd6fe46e56141a5b1b5dd5d979b
SHA25670da5b4940d3f01edd4489f10a851c1140fbc248d6928dabdc62aa192581ca17
SHA512d187fdb262d5651355db9205c4c22a04b9d11ecfb9e84f0e425c3b4c3713369da0fa483d66a511ba8be87e0f818e3caab0ad4b7d82369df65e050e11f3aa2c88
-
Filesize
492KB
MD529ae6665edbb6a7f8edcf20886e159b1
SHA145221da95edbc0b6c2235d7b9800b4117f0fd743
SHA2561006fc025ab056d9474607a990f70228dc19bd8f0f1a45d54c97d1736f7bcfb1
SHA5120fb22cd46c3e207a070b800ad134161f6585d74fd9291b75876f50f302d64647409a287d0bfa8319a850725afe5bee86b0427e2a4bc3f93642f412959d1290c2
-
Filesize
259B
MD5e6ca4903d3de0ccf158909fa28473a9e
SHA1a37967f107404c09381751e89c0d20361d718601
SHA25666e45d7209f6fcf7174d35dec2758c951732883eb8e650ca71ddc4b6cb305c10
SHA512c100dff4115a3ab0defc5d5bbf546679d3d1a9d55dc5b05a677aaf658ff7d0e3cd0f9282d34c4a87f1c382fe290843e6729b403266307757d53cc096bef66d3b
-
Filesize
4KB
MD55c2d58ca8692bcd8ae8d2f53e6f8bb75
SHA1c127e336773e3ed6f08a8da26aa9ea29e278478f
SHA25602c5ff605513e1df82821588a5441bf1efa3f931af09297bed638a8604cf0c2c
SHA512e30326a1d0a80811077737fdb361142970f618a3f5120d90af1dcd32b02370e075b3fab3e12dd0118d9f24e8fac07d37d8ac27113290a89754dbdc3263e0805f
-
Filesize
4KB
MD5fcacac90098637f1455818586f505714
SHA11f6445660782b8d2332d8a2e83dbd88262a1dc78
SHA256806ff972c1b9fc27d4afb9d176fcd1b023da39b782f7b49610ac223dc5908de8
SHA5120aee4b0e529cbb2f2238a93a9ee7948b01a2ccf9d97806fc4f24a8fcc8124ced5699b4efb90ac609640b235ff34f3ea57dfcd4cbe855b9cba9681c32ffb5020e
-
Filesize
4KB
MD5368bbe59310bfecf8d3a336190f84d5c
SHA114ff74eb786381950538783c6870e67898b24a48
SHA25622b334ceaf44ffe4b23d7ec4c1855ac45ed461711055a20d894510a1004150b4
SHA512cb367728fe815994917a7b2c70b6c11f9f065fe5245183f353a4373d4bba747c412f55bb9e0249c20c43a73bb974198ec36c5cd872314556789176d250e0b631
-
Filesize
5KB
MD5c1518a4b5c83091996e6f8cbaa8643db
SHA185b331fe2f0c778e218de34bf13e84c8ec017f7c
SHA2561cd2421d9cf50e89a9b8c376244f6a2711bad3ebce6de2403d8a6650a5264a1d
SHA512708e6c63efdf35d6cddef3a867773cd3aba6bd41fe955e3bac487cc389b7c808f6fae06c8efc285210f8b31a248e7cd34619e573d4ead337524a783bc83ecb24
-
Filesize
5KB
MD53cd7501523034f9397fcd435bc90f34e
SHA135a52b1d7d2dee8d1f256cf875e0ac55fc60aa6d
SHA256a4b64cc833dcde1af7377bd1e25d3860fd6a0e5973818ae6e5d11d87b6c3e9b4
SHA512c2c450e9a0a633d6ebc21565e1a58c6aacc38d82db745edcd01a77c7d9ca68e08dec5f0b0e180fe86291b0211917febc8869790cddcc4b8207ff1ef80c150ca2
-
Filesize
7KB
MD5d82399c78f801e2d31dc97c870f1bfb5
SHA1ecfa4d16a2f19377f5862dfc0da166f41da8a812
SHA2561ab380265db0210e30c062a7ead233fa5d4bd9c5451cd2fb76d17a5b41a7a49d
SHA5129560957795258ddd90b7e4b8515fb89c059f9b236014dabf716fbcb91a94986c2bb95262d576a2cc18ce11d05cc3056fbb25ecf0189d1f54562ccd195397cff0
-
Filesize
3KB
MD59953f5cb31c3e46fc8ece8a7a6b7ed01
SHA128602bc9370fcdb1eb9e5d535fe984ce0d73b447
SHA2563d97f74debe765c9fb7cee65e57ac5928973dabc3433a7d504e053098e4a33cb
SHA512ca4b2200a27382b3543ddd7381ba16d70153cb358ec9dae2c3233379e2636b49c474d86015df0e45af77eebae891fd065f733e4d2e68c746ee13d4d9e5f63854
-
Filesize
264KB
MD57c72154641de1e86de20622b8bc512b4
SHA1fc37bd32a96f48d2219c1da573d88166725c523a
SHA256a57a184097f9c62b7f47b7d6a9ef16b51482ae2b0c04fe279aec3d6058b84257
SHA5128b2fa04064d24312f70ec10f2218157d1b8f674fa1a5154b9d0b07042e5a26db8f2bcd06a73fde93167ed5d24d4ee746a86d3e16faf95d8386ba5c690bf3e74a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
28KB
MD57f80dc14ffce1e607d2b24d2fc47ae9b
SHA1b8944cfe38871c7ff360f090d525d3e6c1d58a78
SHA256481436198edd794fd93d97c14aab2220af54e77ca0f088da8c9d4e5c5a69e5c1
SHA5129a9540e3ac50b430ba9a074a1903785740ad9125e3bd005f18b9973f357dab4bc27210dc887c496e38e17b91180b1a2200ddc408fe24c967c57b92bd7e4c3b64
-
Filesize
29KB
MD57eb33428b4b261a7dfebf35c19c4a804
SHA1df0437d0096c9f3891569b7fa876f263c3073818
SHA2560db99670dfb85da9d9ee1de3a8fc514b93fc6b6463c7a36cedf6f150974bb078
SHA512174855795c88fe65b1afdf5240973fa3b114ade5e5f67887ea0dd246b91739ca0a8a99d0924b2e79e7a65d93308e159d93e38f2c5dac4cc2659d1b951221b3c1
-
Filesize
6KB
MD5ba2100baa4f02212f1e8d263ec220b32
SHA1a7d09e5d6d90699d794fdd93a2dde44582c6d381
SHA25630910d5599fa7b0dfa712e9529fdab62906c865afae86adc92f4c5866e1eb78d
SHA5122793d34f41037218420a3a9b7d2ff3fd001c9ee9c25fa2de5f1891b780b6f3f0d62158f535e6c015c9ab9227839a73ae34e0ab263b1a61ead40bfd70275c0c1b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
4KB
MD54da182047865e6b5842f3e659cf6df4f
SHA15e2526c3c898ef43bd8e8e306082e0695a50fbe6
SHA256101655e690ae2b0ec3b9de0b2f827f2cbf815df008a4a7506e80e93b41346803
SHA51299ba0d242ff43c31b8b586ef293e639830f4e55f3aea7dacb6afeda3de45cfa6401db5377adabd4b276554673f02ca75e6315d61e49efbf02416e390badc636d
-
Filesize
4KB
MD5f0e458a1f55a6dea8c23cf306375c7cc
SHA1606e107e38ea1e370373cbe3d08372bbc89f2b84
SHA25632ac2c7c8d25da7a5534ea557eaac3fac55a7ebbd9c799bf3af559b65d2ff95c
SHA51246cab93456be11b218a8155c276a5747cd7aea772bd14e6a83dd884e869285b8c09c309c49234e6a6605da5f098e5224122744264e0cb176a75517ef5c968442
-
Filesize
4KB
MD5378ef7883a9fde73de2eae58fe79d2ca
SHA197947fcd93e0e30a9aa9ab9afab7a19f645d2df9
SHA2560ce7e3b626af41ac7576fac2ffbec4689cde0d84130df270dbd5b5c12a482d2b
SHA512ccc7b5fd895c67ac59ad89efc637bf444ed21df472ec0e9f15c7c2b2d22a17f31474398858b8d8c6b0bbdbcecfc362d6145e66b5d845022d8988071a27effeb4
-
Filesize
4KB
MD5ed6f0abef67604106e76b29e5e43fd54
SHA124218159a62424e214e294962a3254f696d86ccf
SHA256e50aa903d34080f2da63148dc9f9627a6e604188ca2fe8ead0eee666af2b800e
SHA5127b2488f34ad898c9448036e85d6deb8d2db9e860226bc93b1cfd2d471530dd2920b37470f031bb3ada5d036016cc132af667aa843edca4b0454325d8e11b84bc
-
Filesize
4KB
MD54057b8ddfcb41334392089f7727c5705
SHA1b17780079eb37cb1a3d70d16cd8475dc0fe216a2
SHA25635734b5458eabd8cec8bca18a6c0bb38662b203459921816ce68725ef1b28124
SHA51264e5596e153321621bd53d7e9d6eb0f59ddd08a0c225522f86e62bf61f088980b77e1926200091cf69950bba74ed3a0191bb6ec8c3c72504de5dc8f63d4652a9
-
Filesize
3KB
MD5cc408a9e3882654fbcd43e619a225544
SHA11f076eeba59bd5ff89cb752023a716c5151796f3
SHA256f076dc673a77612c8cab05d7c1023b6da9d1b3267bea29dba01db71647e45bd4
SHA5125934395485134375678a34e7c5d3c9840a76bdccbae6fa331feb40f6035a57dd7d2b7671c351b148b695470406c23eb286b61e280f69cb48ad79df948b96ca22
-
Filesize
4KB
MD5b3526befed36c8c70df7eeead5bed3fa
SHA12c9b366cfc40bf3b84cef894d6e93b38f889c663
SHA25623069cafdb58d583b249139bdf81a3991b781bb03c6061397f68d9145fd2e359
SHA51209bbf03ef01ecf6cb71b45d9d77caede992ca1d0dbc15d7b1e6036a10050dca3faeae09992f5b31d77166d88feb0cda6311633486b2356eb3d7be7a165eac285
-
Filesize
4KB
MD54a9c96b62eb92fe94e7120f0a450a46a
SHA1bdd63b0aa58aa5090b2ba46a6dd0194b61f20b40
SHA2566fd2c06f83b04b0f8a168e2d6e1b0fd81323c819741354850ba1640a84e204ff
SHA5122437735c47d37b9b4517c85ea96a921dcb2d5536485100a2702d74f716ce01662fb43c8ff32b0fbe01584bab6472661463f86d9f58b7e00bef7eac2a62be4728
-
Filesize
4KB
MD530eb5fecf4171041c6cd5d07a0167423
SHA125e1ce915be7248e04788417607fd325e2d4aed2
SHA25668bd3367dbfa221f2c89de67c77d6bc7e5797eb2ffae10ec8b36df96f09bc7f5
SHA5128706681e055b9aca33e40709e523d02c8f7e82a3d3dd076e015d1849a717240f6520187a071912d4b4a255f4a61d369237cd7edc2fb1bd208431128a8da19016
-
Filesize
4KB
MD523786c50cfa0c98c8ff896ae8aba4f51
SHA111bf62dfe2f9f872720f82e3719016524fa17088
SHA256853f4afee1a41544c61df5f1452c5fca4429e940333a05815b7bc161a74c7590
SHA51297fd43f23474e6ec42b57691b079cdf8060d7ff9ee4f6a8b407142e5cb6c2aa16a930aa56549ddd46ae20c94e66e3b0ce39682e2d74a15deee0dd65a49c40f2f
-
Filesize
2KB
MD5bcc193bf1905b2e98aecd34879e10cae
SHA154316affb5359d170b4d1ccdc5681ba32440a5bf
SHA2568ee62909b4b3df17a5236c7506bc966c735b7f0625d24ef3a6737988e8818828
SHA512d1fe3709759005409cbae722d33a0f1870ec592aee85262af9dc92b4c084058f16000e2ab8dbd706c79f870470175adf2f4598497cd62dbb88a172000071231a
-
Filesize
3KB
MD5d6da8fea1b550013b6d396747a2b4d15
SHA13594db4ad38776e4fc37f96927315da5bcd0f5f5
SHA256a5a71d1ba97767daa2424e3e4a60e9d680e16adb73a5ca7843b92548e33c38c1
SHA512d48809c4432465d2c13f814a348af4ba4064691afb891aee6d33e2ec305279ad9f1b47afdc5eea6de71e51b6470a22c5a111b548b1d67c3ed25f0c94b6869c0d
-
Filesize
4KB
MD5ee9c292d62dc7bf9b4f9ec917b71103e
SHA129982d24c502a90b37b8f6814c147d8205a83967
SHA256be40b3c2beadd76cdd6f7fd45f7429d2f481d39cf7642e93c60f896cd968d196
SHA512c2a54de141e7277606e9b8ebe91c5e566ef5886ccb96c9e14369d9610e23c71d0cc0f98c6120e9da508a723b4f844b3395e1bae28d1f5b0d8d50279e50ee76d2
-
Filesize
1KB
MD5e1d2c8612b68bb8a6ef3328b0142153a
SHA191689a7bd0929b74ab52d4b626dcd34a92d8753f
SHA256c59c90cbf8fedca4f7ca6c99740bb4a96762701c803cb1cbb8183158282da72c
SHA5121e045d0961576c0d6fde382dc7532beaa7c542478b6dc4ed47e2c613ec4c913fc5eca800c98debb4795f0a8dc2339ca71fda2c2f60e890887ea212d2a19ccc70
-
Filesize
1KB
MD5d5b02327be1578e480f0fc571e9d0858
SHA122ad98d997ce4c5d9336ba8b769a220a025c090a
SHA25619d450bb01e3b02560426a3bc6eb79dc3ff17ddcc56782928441bbb6d6070d9d
SHA512b133d9d559c925f817d8d6bb2576f413558f796e842160317222b745e10d3e6bf12b9d167e41c95b9a4e87cee8050c11b4419a6e8878b9ce1947e244f02142da
-
Filesize
3KB
MD5e046db50a2db6c9183d4c3b3c148a4d4
SHA1b5bca953ee9ddf2ad16221f5300318fd6cf2074d
SHA256a4e25b63ccdbb05dad351dee2a4c5f6f8344a2417703b6d05f93bbd6f1a9d5ac
SHA51255f1245a74cd74724c24d0cbbeb99361b62bc2732d88547c07fa9bcdbbe61f015d6793bc290837522e5f1f9bc4c1dab6d532610ba1fe13edf48d5e0617b62987
-
Filesize
690B
MD5a3b5047a4b57bfd26f39003d2451ed42
SHA1bb22d410624d68e0b132229d0f43abf46c56923f
SHA2568998eb9a6f20d21b50b88fb667beb62b2159e3fbb69e585db538d1051eef847d
SHA512320e824d0cb55b4cee337908ae8bc0767106af2085c14986e68b998c34924d4bd97d27729967721f7398d403ad1a8b85180bcb925313947fba9656ca18dd32a0
-
Filesize
3KB
MD5a1b7045d8f35b8ca1de41ac9c405596a
SHA14d78ed84f654cad6e3801627fcf419fb96d154b0
SHA25607a7727fbe75e80733b2015e2c0eceb4371eaf2cf8916a2dec9d6b4b54bc85f8
SHA5128b232fedbc97c2b1581e788289948c8db18a3e59e0daa3262c319bb79fd0c5bb91c28fc5d040cb383d58081ec78850351386a582e033b2ea8ec5582359855d97
-
Filesize
3KB
MD5cf5e93758a828a476a0943db292753ba
SHA1384ee41d97cc98d8ab63806547a12efccccc1aa3
SHA25682c65b03071f638ac0a3949e713251ddcf716913522f90f93f1ef91aff4f47d7
SHA512aa39e3617dc4621d61cf0a5ec52db38d0165af8a7943979bcd2037e1cedf1b196103c26bd9e67c8d32867f9592273ee7e3dfbe564c4c2b2d608250cdddfe3100
-
Filesize
3KB
MD52efd42ee02211389fc57bdba8e32bbee
SHA18ecb6d5bc4a74b3f1b080ca80d6bddbaf0efe86e
SHA256e76a10f7034282e7ead28c177a810afd6d6da9fe3cafd1b28314a51bdc2faf98
SHA5126ce89b887431622bd737d519fe08a4cc203f92857c0e6105c165d67c395289298a7fae574e6b103022c6e2d606f8d68256a69868525b8b626c8569eb7210ca1d
-
Filesize
15KB
MD516659af9299f2bc263e0568fe2033b92
SHA1845b4516a8843132baa91257e6ea865948b176e5
SHA2561777be7a63be592f89f762336c9a04a58666d36bedf139f0f943f60343ed2e4d
SHA51217da3256b55f27ee3861355efd80f59d9977bf4165463fa402767e74bd8ba56ae9bd5cc782cdf91d876736df35ec23f8a8d1f576a3d573bd96c6df448108ab6f
-
Filesize
15KB
MD5b10df0587f40a25e92dfcaeb681b12b4
SHA115df76a46dd4c6e54aff6ccd9d518ece7e54b52c
SHA256f49814f25e18a2807f2266d8ca23abb3e25ff157f81e73b83f04260c4683f271
SHA5125f8b52d6dc755ed6d9e1c620bc26e647a4474c0fcd1d609f65c7d235913c27f5b7448f9780b670946e94b12c8f480f85dc7c2752555b36fdfdc36aff002b4e13
-
Filesize
15KB
MD582846e3a21e7fc263f430a4c463d4c41
SHA14a4ea2ddc50b3398d998cf8ac65895b2b99fc5de
SHA256e3705b8a670df0c9396fc3dd7299ec30fa4ef6a71e3d959f6c33050447175c69
SHA5125142108af28de22f3238c53eeb590b4f94a7173280b890703d42b538ecda7ace622775b98fc54623d86ef3085553e64a35e3293aed26cd1a32c7d447569cda49
-
Filesize
15KB
MD5def91aeb465887f11d89027a49fa336e
SHA1fbbd1187edc61f9c30233f312667edbdae93c7c3
SHA256ea47763f4a4caa7d8a0c8bfa1a489a8079e4e684faf18a69944217b8e6739655
SHA512da986cd27ff6b1906630f1087e735581dd60bcdd151ac88adc5e7313727e8b10131b70a340fc285850ee273395723af889c666f9583b4b7287a80393d15ec77d
-
Filesize
15KB
MD596f634754f30dab0e2084532c6f5a7ca
SHA1483e9e6c5127e4a99931b9a0b9bd4da5e1dec8bb
SHA256498535c87408fddfcf8fe0d11879ea6c9c130b5c525c7ceaa83f59f09d5b064c
SHA512409cce9de1285d7754fac2a5a97989f0a02841834313d5cfd378e4617320456da31f55b5d9292e94a6b62cde8b8cedf9a56e58cdab12a7e7976be188eac08b81
-
Filesize
14KB
MD53fc16dcca480daf691e66d34b158382c
SHA1c264d43efdab3c98ee12a6b32c84ed8b1d5fb776
SHA25678327948c9c700e010d0d60b2a5d6516307942e1a004e426c4ee0baa597d9abf
SHA51236d43e072c837c9dc93b901d24c68b7ef666dca9188cf4e3aec9c28f9fc2f9639ce76a0cabb68f0e42d88216d500dae58e53b8c723604be0f3570301caf8c0d5
-
Filesize
15KB
MD5274b12a56227826b4b805658a7c62a44
SHA1047828a48471af2274135b79f0512568dafa613a
SHA256a06af5642dc9c2336429e24874a7e7d59aba48e35e64a7d3e2e9a784e9f7b229
SHA5122f184dfcc551f775fadd570b5e965c16e5f121fa0ac12354210e9ee45fb78ad2c4933e112b358186bb3ed7cca0b45eb928e3648df7348000a8a0de2c150f389a
-
Filesize
9KB
MD53d6dc2c4826b64b2f4afa2a5e38b8f05
SHA1245cb31e15810c01d49ae76dba1197e96b9aa232
SHA256046effb9e0875dde5f02464a035d5eaeab88be5e5521d1ed649f85dc2546c6ad
SHA5128c168d64113bf0f3a17349c3c136035f7a7874f2639d7dcba6c88b40867abac69b81b11bb204611e1af68f036c212860fa9b9fa1e4ba2af223eeb945a99f9e35
-
Filesize
15KB
MD538dc6012f94e3a8e96bc6fba3990a18c
SHA1dd3c475324ed27e88befc1d0515b3edd6a1e0227
SHA256fa94b48034d003d42722aa9003b259fac09aa574aec71f2a186a5c4a4a98a216
SHA5123745779e86faa86e2a7ddce94e48ac294b856d2325c37f523db367d8ebd266c5b17b6f98584b5668139fbe9e962cbe21253f0b756ea84233844c0909b9fe8d82
-
Filesize
14KB
MD57ea820c9ee424306b7c2e055d03c77ba
SHA125ffb96c5000b148267bce6e1e9dd044c88dca67
SHA256cc9e47259a364d9a2de4f8b342bca8f96bf9002aec15855db983e48fb0c2a73c
SHA512bc1b0d6323373b2df6ef9eea1f55b9f110126b93ae48ba93ca44ef15a7a7c7d7eab706f0e549250a582b774292f607d7007132a3fd038ac338b16fe29a677252
-
Filesize
16KB
MD58c6f56b51d25e2685da6f376b8187a9c
SHA169dd2f92cbf451770c12fb6da542ee374d1a971d
SHA25695f3abc39f7fa62574e6155c1096d9c06d1b352c4bb52cc6cf3bd956d4135689
SHA512fd7bf2ab9879d984467b6f175fe2fce1963c326d9a56eb8022630b4e7c2d0272af5fe6be7b445c7ec8e9403c8b5b7f8dfdbab60b8f11a5629700bee863aa6d17
-
Filesize
15KB
MD5957225312d1b22e0ba8ac9390a83ee5d
SHA1f40242867d3898ece54db10d7f78daa3729cf441
SHA25645ef970e3719a03baf0abdff0faee87b785185c07328de28b6c2b19cefa10607
SHA512f86b343ec43b2409e2c70e830880db53e67b1b807e7cfc2a96d3c69cffb1c5a67e0d2c6806eeca77f6df40f78734e400dd70a73d259af51a553ecf524345b2c4
-
Filesize
15KB
MD5b386888df5ea5085246a07577656b767
SHA1f859478189bd9af18b9a0ce021f74618b296dea1
SHA256ddd80cadde1c0187a9a6f3cb872e269ebe23f36a2b5b9f3f7ecc0cf5fc00e88b
SHA51291b338db2e71a0a44587a204d1ecffbb057a5637dc677e6b4bf825677981b02180738eac22601b648c3b6963e700ad16973a2812c61552f32725c6459e15783d
-
Filesize
9KB
MD5bc69653e76fb8a7600c1fad4a61b149d
SHA1e7f7a081850f6141b4205494ee53b37bc0126efa
SHA2564effdcddd6b319a12c0906cb52e73ba41f4b1584a5e8c44aed50563c8ec02c52
SHA5120f6626c434a6d0163c18df1072c23a908f06ecc010b2081e937623cd234e4dcb0febc1ec14442f4e3bc39a2d38d1c4464a89b5fd29693e1a021c41786eaea4bc
-
Filesize
10KB
MD55945b51da5be275bf3e5141e1b6fbe07
SHA1bcb203a246ae1bae179a5b31d0483d8c284e2a10
SHA25633810a4d8d9c10009a490e2a6111ec8d8646ab2c5732d9b372d717097cc42e21
SHA512b7b3a3b1da76c3816a56e3e41759b2a8a0e328d85a34c9b59f18930eebec4bad68c41cac5f656056a6958e877c26b18b2fd386e0693d5a2a8105556d8617fbe3
-
Filesize
11KB
MD54e37bae17d923815f1203867c5d9152a
SHA1331848246235d4239b3b44d57fbc496d1eac8f96
SHA2560a47c853f6165b0275aa79bef2118db11e5577c4124f329905a3cd217f6b5da8
SHA512f37a4c2f69aec09d025eefb45141e02436d54935eec6dcfeb3578c26e8fed89bf1556064321220ff11a266c1c523382c9669165739f641c14f5858e5f50db411
-
Filesize
12KB
MD5d9981a10eaa9ce9a9e4b6bff726b8b08
SHA10552ad662b909add23f3e85b340129f8cf28b45c
SHA2563c0f053671e81e18bf48857ca3ab6f539592e048ac3babb8d370f006064e875a
SHA512dd3dadd6437aa9a22fb7b59c3c4adf15f0dad4c4d7ae65625c1fd8d897f7cee42d28952acf82f24d6d4e2d2f648da70eff281d4aedaca454d036b1c236d9c1a9
-
Filesize
14KB
MD5477c326d3cac58124a75c60667fc6a62
SHA1ac19a59f5eb63ae666b1f646fadf7a321c28b31c
SHA25634e68ad36d8154ceff581af8a71316a81f644f4fedd64c866ef795dc4d00fec6
SHA5125c7f60b5b38ae326bea0f5dd550c51b9d1c170cbb05e6c6415efedebfb8d3c416ae54cc9fe2383620d8e0e4852cb5939b19e41fa5ff06ea71943e12aefe20d1b
-
Filesize
17KB
MD5ec55913f0405b120de1d8253606b0679
SHA12b3b47ad3a73cbca785789ef8f46072279d7186d
SHA25638d2d71c9748e654141d628848231bf8e2531d87a7fdc4fde2fea0ac2b4ac885
SHA51218c2ffc56b268cd11e09ab662b5fc75674211dcb399805bc94a6f475e2b4978dc0fa3e2154b17e4009a515bfcee3d4b4650b7172b85795cb9372bf58342a84a5
-
Filesize
17KB
MD5a04e232a54a360d958e16909d2b4f2de
SHA1a255069dbdda05b8089b52d2f9969dbd5d08a5d6
SHA2560d1171197a8030891622f48e9f5a33942c495bb2693de8a8cf42c8116f1fe409
SHA512779b3e4bb95417d87fb0285ba447d5ad01b47c3846fb957ddb0e05c521bb83cc319d4f70bf0108b1ef01cb5c125f1d0fbfaa03f6180fd0cd6ca304f78fedab07
-
Filesize
13KB
MD53a73601da87f41618c2765ce0e9e7ed4
SHA1e9ebf6ac487a05cb15f6dae1cee3bef8f134b769
SHA25654286427d861e15aedae05990b1568f483e11ddd4570eb4588d4c0111570c9af
SHA51217c5f165f73abf002eaf48c2c2ef01d10700d8450452925b48c3419ea43afafc38da3a4966e4a74160d8c96c94365f91bd0b7badabce1edb741e78737981a1d5
-
Filesize
13KB
MD52fa105ec5cd02820256bc9d92aa0161e
SHA134f1e13ad3142ed80c68d86e9d1268c020430454
SHA25698dbf57ccc42579f0f3af70bafcea028fc196390973f7cd34cbebdf30f94c4a1
SHA5126a1a8834bce9d94c7e388515e4d3d253f6f492e7191818711598d0dfc56676346c1550ec20c87337b6eb632b345736b950c54dba21fccb69c993f827a71d0067
-
Filesize
11KB
MD5e1991ee0c23e52d82f9dc1ecd7f8ef8a
SHA1b652e9689bc4964adb38a7dd1b6e51eddc6844f9
SHA256de2ac20572db3de917f75270c73475963c2c5e6eebd20ba4383d6a14bd904ad8
SHA5122f9b6fd0ff52b485a76892382e2624c57fd151f18cf81d2b098abc4ff58c3cc8ce7a5741db5921b4da0deb86b038e04b7f27500afacc4afbae2cf6b6a50077ed
-
Filesize
11KB
MD515cb1740176c51955d08988ef659c966
SHA171f035aef5af863725685670f063faa760e7d70f
SHA256034a6a8dcb0bb1bdc70b4d2d2784503c9197a9920f0eafc3fa4d4bf0635cad0a
SHA5124e765c7b234523b9b8e269a72cb642f460c795b86c4aaf55b8d4720110c424e751142290888430edaabb926eb77c6a4f28030a39bc3a70ae807609fcc15851ad
-
Filesize
14KB
MD51185bc820388dab2baed5ac12af9eef1
SHA10798df6a8edff12eca72eb2e91df1cf2a637d7b9
SHA256a99b92775383cce82a685876e92cba5ff89cdd3b747f22400bb24085a16c45ba
SHA512a3d16c4797eed6d53f0e6d84002c7c733b40b3d1f0861081d0467005fdbd896a8f2d1458f94926bc511a623e3eb3182ba6499efaea91076719669ba2d490c616
-
Filesize
14KB
MD5cc54b23dd15c6c7daf852d4639db206f
SHA1bc27e63a3b078927f0473f98a88344df7ac32687
SHA2563ca215e8641528186eeb766d8166ba5a5abcef56620c1aeb78343bbfc958a13a
SHA5121a4003570839443c6bc4f27f33fd3ebc071e562b5a713cc5512d9438eb749b72eac81ec77329b308c3ee4e72abcb3bda2a14cd4daf4640b018d8354399fd5bd9
-
Filesize
15KB
MD574f806c7781541ee3fdf79cff3f05959
SHA1f5f89cba176d06c82cb555d77cb863151a9f0f43
SHA2562793063014eb3e849399c875021735092c27ebe8b62fba3ff211428238882cdc
SHA512337b4c7029f1efc1242deb8980cd985b9cd7b963b6332d590b8e6d56f5dc301d785fbf685bef306f26d3638794326523af8bb3f247bd13ca85a9fa6ead65a60e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5456f975a468a3017ee4ed2e2a314bcfa
SHA10c8c487a97797a5d2e3da2d4990df1c9c3cd04d0
SHA25640aab8722e95972ddb081d045ddeadf3dd57a4d121972730d9c8d0d309e90224
SHA51283eaaa68deb7551a61a504044d7c8bc65b60680f59003351b3a0e682ff524f2ca20850c158b4843c9728aeb7be647c7021a1b27c2eb179a0c79682177484ec0a
-
Filesize
18KB
MD54efbec73e26ea2bcfb1069acedefd99d
SHA135bcde00be1cd840fce3c973b559e724621baa3f
SHA256abfddace688a2a452efc578dfb61297d13e3aba3dbead0bc9f2c82df57ff46c8
SHA5129575b6b7eaf66afc97391ce8c6af1c9201d7455628e7548b230ac316d5e8477674221473d75c262bdcc5dc703814ce1b42a7669540099b8913bb0a5e8a448f7a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\fe84ee06-8992-4360-86e2-ee04d86b499f.tmp
Filesize15KB
MD55384fe70de18e310a10fcb2cf6f6035f
SHA1f9a1d403625c86175c1407bea5c2cbb336605cff
SHA256ed4bbeb0ec3e6747f5d4eb03cee91a68d53b8058a4860240b189606e5987024c
SHA512cf947bcf83145373eb2c0b4114cdf0ca09028e40d4e7631be99110e3b06090d75318222efbcc474aa66f4d85b66f5fc23e6e19286e50c4a0c17b560de7fead30
-
Filesize
60KB
MD505a5eb4134dedea5aef15711b02bc08b
SHA1906b5136a584cff4758a988a41baf0cc7b454e5a
SHA256669dcbf4ea68e8ec1b1026f87d47b754753692c401b9d4639640f7fff506da85
SHA512f0c82bfa32d10bb93487047f938180499a50cb91cfa60043bfee38f2e4fa96e688ff8a9163939f6d67de34f5b955ccc6a8b95b93201a07f3498a7e9d94d31700
-
Filesize
106B
MD5de9ef0c5bcc012a3a1131988dee272d8
SHA1fa9ccbdc969ac9e1474fce773234b28d50951cd8
SHA2563615498fbef408a96bf30e01c318dac2d5451b054998119080e7faac5995f590
SHA512cea946ebeadfe6be65e33edff6c68953a84ec2e2410884e12f406cac1e6c8a0793180433a7ef7ce097b24ea78a1fdbb4e3b3d9cdf1a827ab6ff5605da3691724
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
119KB
MD5cfc2fafc5d9321a042c8729046e1cd7a
SHA106a9f8d77c0e6b6750c15af4a8ff4ba9c39081f2
SHA2567df9260efb559ae6ee6320e16b29739ae0bee17d1732d380374b83efc0d03b16
SHA5123b672877ba3395da99808c2e5a2dbebe786ec7846860fa23604dbee0f04318f8cdffb594375ead51bee4aeae250f75ad4ce5206b7194721ff54eaedd9d2313e6
-
Filesize
119KB
MD578ba0096cb23226d0e822be9584bffbd
SHA15fcc816ccbf9b507642162bf01d3a7d205fea96e
SHA2566fb3727764dcc0dfdb2b2bef395c0199e7513bf903ac74f9ebb7fd78e8124d24
SHA5120328ac05f26834d70fb2d6dd8144577b7dc92409423b58ddff848a4d8e1b32d5a7b2a8f1438f1a0029707751f2aa841d345dbf8a43ef6da835c1820bcd4a76f0
-
Filesize
119KB
MD5a30627fed8945aadd91e21d8e49b02d3
SHA11341a6c3ba95c20d48ccef9de9880afbb713ea64
SHA2566a8596ed0532c1c13860ec10e94be469a1e6f4c04c05a82916af288052a2af37
SHA5120b7b5dd1b12d86d98d7b69cfaed87c92888b9bcb97545c7dca2997b0537182ea1de0f7d7c4b2ae29a492a520e0642b63be662c9c6f78f6c1f4345114d53dba66
-
Filesize
231KB
MD533fc1cc92f3d4919764b19efc0adb3d1
SHA1747b6ce508fc19d897b2a8707f076a773ab75c48
SHA256dcfca3717118f40ba8cb7441e0d413680b3a46d445041dbe3892d09bcbd8a715
SHA5124b2ddba12e8cfbbb94f70881b161db95e09c9735ba9cfb90bb2e3288c204773f79c92d467538b779efbce73ebb8513b193beaae5dd66471d173dd7fe75219100
-
Filesize
119KB
MD52bd05d6c68f92620eaf4d23bf0a6a9ca
SHA1deb5ff46665bf1cc19dc7722651fba655e6f6fc5
SHA2562c49c0447831f540be7ffa3c2148aabf058341da58a0c6d1dea963c166526aa9
SHA5124904797cde356b7d6dc4b6ef4521fa522de438e830f9b2a3ba973ec4f58c9a12689d128e00343443b212796792bd5a4852d1ef825caebdfc2ef198c3f32edc7d
-
Filesize
119KB
MD50191d8989e7302ad288085f981c5c65c
SHA149ed06f1183983c98a7751482657b68f5f991324
SHA256f50aba8ab532528bb19c5e893fc2db5b975f7e7f474b01718ac95dad8dec9b10
SHA51204d68474fae37caeaa7d4c806ca377cba44f91d1725a2bb56be01113351bb93a6a1f8a998d2eebc8d9fafc74a921cdd8c74a079ff210dd6c22299c4c5625cba0
-
Filesize
228KB
MD5969f252396ad17a9fe597096c84a8d34
SHA15b48a7a4cee675f0148d53f9f2a13bd7ce20f90b
SHA2569d14a8b5b392b0dc48fa0c6a65dcb11888f7e411a74f7fd7bc9a06b248c19c62
SHA5122df9b7f2294f706d8270925b7588abd8f8943afeb03857f80a1f9da59581cd97567e5b9f2b30c4963bc7dfe892f6119f41930e8bc725573759a0e1a49e14ed6b
-
Filesize
231KB
MD5322a6f8e476fdc193faf534b9d90a450
SHA1d834f2702b98449c76d9c8b60b1a2e40e3df3ca6
SHA256f37bf704c0b555ca019133701db86f61690be92ca65536f769699465aba3dc4b
SHA51269d2cb795c80b80d524ac0fb9a113a7a65d09e8d2814ba5dc612958253e3ae76944a0e3786101c3899ae5d8c7d21fd79e9e8faeffd44d8ffd3ab058b9eec45c0
-
Filesize
228KB
MD523e8eaadd897ed2688f04d66bf8ff445
SHA161fb2bed72e3a4dfc9a0f83d11407bb92a22f1ef
SHA256edb0a6ebe405a0ec23b6885f70215e5b5912a14b42a7055b61df58b0c5057a94
SHA512aeaaace1bc17c04a5ae08265646c9816c7c0f81b30d7202dad298cf9483c5882adf2a0ff2ffa893e3389536a8ab82dcafdd35948f3137a1be8054039ee032ed7
-
Filesize
119KB
MD5fa7e783d264a28fe5cff058228bed898
SHA18f2607491ebcfd5a770c287ca56dd0434948b5f6
SHA25634c6a9d8e5400c9e4a84a872bbaa4eb3a3477f010bf252d1aeb1449b9f6a1bdb
SHA5122437255d2cdef9bdd61f28b0906ae9b10e16c04e57cffa018af23bea7883fb225c15c217fbbf58e78fe8a4c7452b9acc0b2d82e8d72064e992a34abe89bdb2e1
-
Filesize
228KB
MD596f2c341ae84ec7b5dc191900c6b4042
SHA119e5d82451949d633f335139bb1e2c0e9c5b2265
SHA256477b915dc6223a5343e26afa8ed037e185b9061fa636e3bfd414185105ae29ef
SHA512d8e92826506d73b012b1225d9969a8887a5958a0d0cd56ef217cd25c320613dd65815eb61cd4db58502bbfd3304bbc1b18835c1bbb5645d44cb88453441f59ea
-
Filesize
228KB
MD5d555ef3d572e92e03fc1c6f5d4aded25
SHA1ee573774fcbbe926eb5c897f7625310450ba2896
SHA2568faaeefc2bdc9d06825a555c4c4c1dd64777e2bd10da081fea8f5ae42701d79a
SHA512a821c5e85a937ecea6a40c9fc9c431b8d04291867b9fede54cf01716f89fae939562b1f1a94820a7c6cf4a598bcd3c4200559845ef920d05704775becf4d4bd4
-
Filesize
228KB
MD5f3ad52697304e233e86744d3591f59e8
SHA1881a4af875f41c3b6f1a85331264917929c57b26
SHA2564134eadef452707d3f0afedd17ed5c4c05cd3f1e351a87830a1be1013391d847
SHA51217d8ea25841a4c58d447b4789b653646ee39e29379d883d7a907c668aadd3db1dc3f9bfb32a4b3f4050baf3223698fa173a30538ea3b7a4429474d53fb1570ae
-
Filesize
264KB
MD5f0ae4fb9588416f0220e8a25ac7be2bb
SHA12a63e7b1c7653e4687d02cf11138b864eb151f08
SHA256ca9dd84d4e6766d9bb35f169229a28b85bf73dc923d746165534bfaca1b21660
SHA51245f3e23ed56120f0b70787cd93af3839bac684fea31ee5026e54f307acf932c65ed4c89140e4c03c9cad055e7ec6de1e837eda9b31083a7616ba1cae9dc0c0b8
-
Filesize
85B
MD5bc6142469cd7dadf107be9ad87ea4753
SHA172a9aa05003fab742b0e4dc4c5d9eda6b9f7565c
SHA256b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557
SHA51247d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
36KB
MD5c43bd80158a27b28644c8ec3b8d68c78
SHA1d979619cc0a9eaf8341e0bd7714b9ab3ffd923de
SHA2561cd77cd5512af12bd91fb0ab511f8735486fe742bb76f63b1b5f97499d01ffa6
SHA512362766941668f52b71c38e0334fa19d5a4c555410657f6bcab170a0fdb9942748705c11f2c49752aac1a44f186474a148b08f6477e111c5750d0da80e128ea19
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]
Filesize933B
MD57a2726bb6e6a79fb1d092b7f2b688af0
SHA1b3effadce8b76aee8cd6ce2eccbb8701797468a2
SHA256840ab19c411c918ea3e7526d0df4b9cb002de5ea15e854389285df0d1ea9a8e5
SHA5124e107f661e6be183659fdd265e131a64cce2112d842226305f6b111d00109a970fda0b5abfb1daa9f64428e445e3b472332392435707c9aebbfe94c480c72e54
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\@[email protected]
Filesize240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
Filesize
3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Filesize3.4MB
MD584c82835a5d21bbcf75a61706d8ab549
SHA15ff465afaabcbf0150d1a3ab2c2e74f3a4426467
SHA256ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
SHA51290723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244
-
C:\Users\Admin\AppData\Local\Temp\7zO0ED5A582\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe:Zone.Identifier
Filesize55B
MD50f98a5550abe0fb880568b1480c96a1c
SHA1d2ce9f7057b201d31f79f3aee2225d89f36be07d
SHA2562dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1
SHA512dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6
-
Filesize
37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2828_1803443763\b566dcf9-d819-4b25-983c-c4d307f6747c.tmp
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize14KB
MD55996a0298cc1116a1a770b4b534558df
SHA1bbac1b1892198078cef32267bd948e5f24e87c20
SHA25600d582279374dc494418b43b1fad183e99d84579f5b9934582df7f5e1fa3b5dc
SHA51204e9c2398e8f2319feff142a95e7019b44f2a26df726856f967a7a6df14188a506513259497596a3c035e32d7946be4c39da3089a5272d5c31ee3d6961170190
-
Filesize
6.3MB
MD553b0dd242e9210bf7b6e2c99a2d35f8c
SHA16e871a89e5d229c5f8f28fc53325bae09ce5bdba
SHA256ddf3cdc51823dd0358ac1484e0ec444b5a94aa3cf01ea5d233993e099fdbea8f
SHA51258468cc7ab5eb2d5e0e257747ee18926f645387da7fe0e1c80da60775b4400f21f969e5ec9f676fc84c437046995a00d13faed0554ca9d0e56bad83a6e9c2724
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
8.7MB
MD544843c6b70d7546d4dc7af9b4f28ad34
SHA1c54d00ba3a1dcc4036b7590e5a55680686e05c78
SHA2569f344057ed2f934b4975bdb0f5c4c7ff86848b2abf0c1c7ececbaa923173acec
SHA5122afa005ff0c0202fb5101e3a07f97253913d6264b2b14e0f1369f38caa2420c41fcfa75256c2fee92b6647dafb4dba7476ac83137427addf4497c6486cdad3ad
-
C:\Users\Admin\Downloads\Data\@[email protected]
Filesize1KB
MD5f3e73cda200617db921010994c9feca8
SHA19f5465335f554cc4281ac56cb4f2d482af17169e
SHA256f1b95286520f0bab6d8ac5100f3c45e204bfc06fb2598407e6af1345d32a1767
SHA51278508effccbcaaa8ee6956e64b942198e1c3b141b3c0856625faf7c83e6b0293c502cb7c7ff0c39b56d82a101e049cd79361b55b6f5050bf100cbd83b3180fdc
-
Filesize
3.3MB
MD5efe76bf09daba2c594d2bc173d9b5cf0
SHA1ba5de52939cb809eae10fdbb7fac47095a9599a7
SHA256707a9f323556179571bc832e34fa592066b1d5f2cac4a7426fe163597e3e618a
SHA5124a1df71925cf2eb49c38f07c6a95bea17752b025f0114c6fd81bc0841c1d1f2965b5dda1469e454b9e8207c2e0dfd3df0959e57166620ccff86eeeb5cf855029
-
Filesize
22.5MB
MD50ba9bddf58c9d7763f63442efb6e30af
SHA1a5e8f717ee437118a36cde1e2d26e8dad4169622
SHA25632fe98a9a77a656afb7dd3c39b6cad1ac5222c2fc9313a8aba6ae8546f244371
SHA512a5637ad57f8b52ae2523d5443db9bc6255bd05e563b47a3f88903624751d1913b23b52c000cca93436b65876391da797bd25211c27027917864ac394b67c1298
-
C:\Users\Default\Desktop\@[email protected]
Filesize1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c