Resubmissions
09-02-2025 18:43
250209-xc9t9azjfz 609-02-2025 18:18
250209-wx2tpsypex 609-02-2025 17:43
250209-wa19naxrgk 1009-02-2025 17:24
250209-vynsssxnhp 809-02-2025 17:01
250209-vjteqsxnds 609-02-2025 14:35
250209-ryd2tatqek 109-02-2025 14:24
250209-rqq2eatnhn 709-02-2025 13:39
250209-qx2k2ssqdw 809-02-2025 13:24
250209-qndgvsslbn 6Analysis
-
max time kernel
866s -
max time network
867s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-02-2025 17:32
Static task
static1
Errors
General
-
Target
test.txt
-
Size
18B
-
MD5
5b3f97d48c8751bd031b7ea53545bdb6
-
SHA1
88be3374c62f23406ec83bb11279f8423bd3f88d
-
SHA256
d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b
-
SHA512
ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6
Malware Config
Extracted
quasar
1.4.1
lol
dance-accident.gl.at.ply.gg:51563
54ed8b17-3597-478c-95d1-4b1d15f372a6
-
encryption_key
8CD00AF856EB213642BC359A2C56F5522069C505
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/memory/5040-1876-0x000001EB2A9D0000-0x000001EB2AB08000-memory.dmp family_quasar behavioral1/memory/5040-1877-0x000001EB2B100000-0x000001EB2B116000-memory.dmp family_quasar behavioral1/memory/3364-2056-0x0000000000DA0000-0x00000000010C4000-memory.dmp family_quasar -
Executes dropped EXE 5 IoCs
pid Process 3064 playit.exe 3256 playit.exe 3364 Client-built.exe 5192 Client.exe 2428 playit.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 597 camo.githubusercontent.com 597 raw.githubusercontent.com -
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
flow ioc pid Process 174 https://storage.googleapis.com/script.aniview.com/ssync/62f53b2c7850d0786f227f64/ssync.html 2112 chrome.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\playit_gg\bin\playit.exe msiexec.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File created C:\Windows\Installer\e59a0ab.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIA1E3.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DF9631608A58F44267.TMP msiexec.exe File opened for modification C:\Windows\Installer\{8C17366B-843B-49DC-AC1B-748DC264E06F}\ProductICO msiexec.exe File created C:\Windows\Installer\e59a0ad.msi msiexec.exe File created C:\Windows\SystemTemp\~DF4401527395E72239.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\SystemTemp\~DF175158C8D18056EF.TMP msiexec.exe File opened for modification C:\Windows\Installer\{8C17366B-843B-49DC-AC1B-748DC264E06F}\ProductICO Taskmgr.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Installer\e59a0ab.msi msiexec.exe File created C:\Windows\Installer\SourceHash{8C17366B-843B-49DC-AC1B-748DC264E06F} msiexec.exe File created C:\Windows\Installer\{8C17366B-843B-49DC-AC1B-748DC264E06F}\ProductICO msiexec.exe File created C:\Windows\SystemTemp\~DF43B2CFC6B201FA1E.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "55" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133832503974393607" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Quasar.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B66371C8B348CD94CAB147D82C460EF6 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B66371C8B348CD94CAB147D82C460EF6\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\NodeSlot = "5" Quasar.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Quasar.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B66371C8B348CD94CAB147D82C460EF6\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Quasar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\SniffedFolderType = "Generic" Quasar.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "4" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 Quasar.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Quasar.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\B66371C8B348CD94CAB147D82C460EF6\Environment = "Binaries" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B66371C8B348CD94CAB147D82C460EF6\SourceList msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\4AEF046202130BD4399AB6404AFE7E2D msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 Quasar.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Quasar.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Quasar.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 010000000200000000000000ffffffff Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Quasar.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B66371C8B348CD94CAB147D82C460EF6\SourceList\Media msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Quasar.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2 Quasar.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Quasar.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2499603254-3415597248-1508446358-1000\{9BE0B551-1540-44E1-A6EE-559AC863B4E6} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "6" Quasar.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B66371C8B348CD94CAB147D82C460EF6\ProductName = "playit" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" explorer.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\playit-windows-x86_64-signed.msi:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Quasar.v1.4.1.zip:Zone.Identifier chrome.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1208 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2324 schtasks.exe 3040 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2280 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1896 chrome.exe 1896 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 1968 msiexec.exe 1968 msiexec.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 5040 Quasar.exe 5984 Taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe Token: SeShutdownPrivilege 1896 chrome.exe Token: SeCreatePagefilePrivilege 1896 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 4320 msiexec.exe 4320 msiexec.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 5040 Quasar.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 1896 chrome.exe 5040 Quasar.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe 5984 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 2280 explorer.exe 5040 Quasar.exe 5040 Quasar.exe 5040 Quasar.exe 5040 Quasar.exe 5040 Quasar.exe 5040 Quasar.exe 5524 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1208 3068 cmd.exe 78 PID 3068 wrote to memory of 1208 3068 cmd.exe 78 PID 1896 wrote to memory of 5924 1896 chrome.exe 82 PID 1896 wrote to memory of 5924 1896 chrome.exe 82 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 884 1896 chrome.exe 83 PID 1896 wrote to memory of 2112 1896 chrome.exe 84 PID 1896 wrote to memory of 2112 1896 chrome.exe 84 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 PID 1896 wrote to memory of 6088 1896 chrome.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\test.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\test.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ff90010cc40,0x7ff90010cc4c,0x7ff90010cc582⤵PID:5924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1792,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1980 /prefetch:32⤵
- Mark of the Web detected: This indicates that the page was originally saved or cloned.
PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2076,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:6088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3548,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4408 /prefetch:12⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4292,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:5304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4572,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3444,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4932,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5056,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5092,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5260,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:5880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5172,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5060,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4864 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5300,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5028 /prefetch:22⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5396,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=3764,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=3772,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4696,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=4660,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5072,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=3244,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=5864,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:5484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5732,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=5860,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=5232,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:5152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=5488,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:5520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=6372,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6320 /prefetch:12⤵PID:5824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=6356,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6464 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=6652,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6616 /prefetch:12⤵PID:6040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=6640,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6760 /prefetch:12⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=6768,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6924 /prefetch:12⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=6944,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7064 /prefetch:12⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=7232,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6596 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=7084,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7396 /prefetch:12⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=7352,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7520 /prefetch:12⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=7360,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7656 /prefetch:12⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --field-trial-handle=7788,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7244 /prefetch:12⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --field-trial-handle=7676,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7780 /prefetch:12⤵PID:5544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --field-trial-handle=8084,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8092 /prefetch:12⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --field-trial-handle=8224,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8240 /prefetch:12⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --field-trial-handle=8432,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8440 /prefetch:12⤵PID:3956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --field-trial-handle=8228,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8548 /prefetch:12⤵PID:124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --field-trial-handle=8668,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8680 /prefetch:12⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --field-trial-handle=8416,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8856 /prefetch:12⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --field-trial-handle=8716,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8968 /prefetch:12⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --field-trial-handle=9136,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8376 /prefetch:12⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --field-trial-handle=7048,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9280 /prefetch:12⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --field-trial-handle=9448,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9412 /prefetch:12⤵PID:5552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --field-trial-handle=9604,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9588 /prefetch:12⤵PID:5392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --field-trial-handle=9720,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9740 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --field-trial-handle=9580,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9900 /prefetch:12⤵PID:5608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --field-trial-handle=9420,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10000 /prefetch:12⤵PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --field-trial-handle=10176,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10200 /prefetch:12⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --field-trial-handle=10304,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10320 /prefetch:12⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --field-trial-handle=10456,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9904 /prefetch:12⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --field-trial-handle=9156,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10612 /prefetch:12⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --field-trial-handle=10588,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10600 /prefetch:12⤵PID:3500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --field-trial-handle=10700,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9740 /prefetch:12⤵PID:5648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --field-trial-handle=10716,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7696 /prefetch:12⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --field-trial-handle=10640,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9148 /prefetch:12⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --field-trial-handle=9808,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10404 /prefetch:12⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --field-trial-handle=10428,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9856 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --field-trial-handle=9304,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7028 /prefetch:12⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --field-trial-handle=10440,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=68 --field-trial-handle=8972,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10204 /prefetch:12⤵PID:3764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=69 --field-trial-handle=9800,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7040 /prefetch:12⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=70 --field-trial-handle=8544,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9256 /prefetch:12⤵PID:6036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=71 --field-trial-handle=7228,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9148 /prefetch:12⤵PID:5372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --field-trial-handle=3376,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10664 /prefetch:12⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=73 --field-trial-handle=10032,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=74 --field-trial-handle=10464,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10556 /prefetch:12⤵PID:5676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=75 --field-trial-handle=7164,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7200 /prefetch:12⤵PID:616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=76 --field-trial-handle=7156,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=77 --field-trial-handle=7116,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6316 /prefetch:12⤵PID:2668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=78 --field-trial-handle=8168,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6584 /prefetch:12⤵PID:5516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=79 --field-trial-handle=6476,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6552 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=80 --field-trial-handle=6520,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6516 /prefetch:12⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=81 --field-trial-handle=9876,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8896 /prefetch:12⤵PID:5820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=82 --field-trial-handle=8940,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8928 /prefetch:12⤵PID:6128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=83 --field-trial-handle=3196,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8412 /prefetch:12⤵PID:488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=84 --field-trial-handle=8708,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9908 /prefetch:12⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=85 --field-trial-handle=8236,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=86 --field-trial-handle=3704,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7808 /prefetch:12⤵PID:4944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=87 --field-trial-handle=8240,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8396 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=88 --field-trial-handle=7984,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7800 /prefetch:12⤵PID:5848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=89 --field-trial-handle=7132,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8636 /prefetch:12⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=90 --field-trial-handle=6140,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9884 /prefetch:12⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=8744,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7888 /prefetch:82⤵
- NTFS ADS
PID:4364
-
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\playit-windows-x86_64-signed.msi"2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:4320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=7028,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=93 --field-trial-handle=7492,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2632 /prefetch:12⤵PID:2892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=94 --field-trial-handle=4876,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10260 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=95 --field-trial-handle=8532,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=7512 /prefetch:12⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=96 --field-trial-handle=5840,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10856 /prefetch:12⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=97 --field-trial-handle=4436,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=8456 /prefetch:12⤵PID:5200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=98 --field-trial-handle=10444,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=9804 /prefetch:12⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=7688,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=8020,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6980 /prefetch:82⤵
- NTFS ADS
PID:5984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=101 --field-trial-handle=1448,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10848 /prefetch:12⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=102 --field-trial-handle=5568,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:5568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=103 --field-trial-handle=5696,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6952 /prefetch:12⤵PID:5544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6352,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6392 /prefetch:82⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6388,i,7306748643342832881,4864714731494883194,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=10036 /prefetch:82⤵
- Modifies registry class
PID:2580
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2340
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3376
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5136
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:5188
-
C:\Program Files\playit_gg\bin\playit.exe"C:\Program Files\playit_gg\bin\playit.exe"1⤵
- Executes dropped EXE
PID:3064
-
C:\Program Files\playit_gg\bin\playit.exe"C:\Program Files\playit_gg\bin\playit.exe"1⤵
- Executes dropped EXE
PID:3256
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2740
-
C:\Users\Admin\Downloads\Quasar.v1.4.1\Quasar v1.4.1\Quasar.exe"C:\Users\Admin\Downloads\Quasar.v1.4.1\Quasar v1.4.1\Quasar.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" /select, "C:\Users\Admin\Downloads\Quasar.v1.4.1\Quasar v1.4.1\quasar.p12"2⤵PID:4508
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2280
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5984
-
C:\Users\Admin\Desktop\Client-built.exe"C:\Users\Admin\Desktop\Client-built.exe"1⤵
- Executes dropped EXE
PID:3364 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:2324
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"2⤵
- Executes dropped EXE
PID:5192 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Quasar Client Startup" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"3⤵
- Drops file in Windows directory
- Enumerates system info in registry
PID:4720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff90010cc40,0x7ff90010cc4c,0x7ff90010cc584⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,10264764571128936820,5913744691286449968,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=1800 /prefetch:24⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2072,i,10264764571128936820,5913744691286449968,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=2124 /prefetch:34⤵PID:5912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,10264764571128936820,5913744691286449968,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=2472 /prefetch:84⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,10264764571128936820,5913744691286449968,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=3132 /prefetch:14⤵PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,10264764571128936820,5913744691286449968,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=3164 /prefetch:14⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3116,i,10264764571128936820,5913744691286449968,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=3576 /prefetch:14⤵PID:4652
-
-
-
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 03⤵PID:5824
-
-
-
C:\Program Files\playit_gg\bin\playit.exe"C:\Program Files\playit_gg\bin\playit.exe"1⤵
- Executes dropped EXE
PID:2428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
PID:2240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ff90010cc40,0x7ff90010cc4c,0x7ff90010cc582⤵PID:5692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,18368646294275985391,16599154313350542439,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:6008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1692,i,18368646294275985391,16599154313350542439,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=1988 /prefetch:32⤵PID:888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2096,i,18368646294275985391,16599154313350542439,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=2160 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,18368646294275985391,16599154313350542439,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,18368646294275985391,16599154313350542439,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:3720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3736,i,18368646294275985391,16599154313350542439,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4792
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3624
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
PID:2432 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90010cc40,0x7ff90010cc4c,0x7ff90010cc582⤵PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,6387682450411200817,9228404951158638629,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1808,i,6387682450411200817,9228404951158638629,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=1952 /prefetch:32⤵PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,6387682450411200817,9228404951158638629,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=1720 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,6387682450411200817,9228404951158638629,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,6387682450411200817,9228404951158638629,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4480,i,6387682450411200817,9228404951158638629,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=4452 /prefetch:12⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3296,i,6387682450411200817,9228404951158638629,262144 --variations-seed-version=20250205-050123.127000 --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:3132
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4812
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3959855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5524
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD57ebf11f48787c4de142746a63b3117f8
SHA16089d9426deaf50e4b101c32ce0e0fa2ba9f885b
SHA25684fb96086bdb3a2e93ded1fb885adeab6b326ab12f7b1ec2543f543410127e41
SHA512fe238d6b226836799bacb2e3186df0a427f474c4ec1191a536ba41c0374b4abd82572727d2c52e47e65607f7b1f09787047350e460ffd6b7c6874580465275b0
-
Filesize
4.4MB
MD5241ccb769e4aeea48edd83ad6f3e7020
SHA1e97a24adc53493545cdd15f461383e734e531530
SHA2561c36cc49894b8effb0438a0d810f90b0064178b0d73bf4af7e526273c56dc090
SHA512e99285da2ef1c431465086860f15fb343e00e978c03b4880aeeed3ef916f19a48c455672cf8fae95c6daed5744c49368101afe307b99c7c3c7464f838a43e03e
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
235KB
MD5137c12f43d75964337800d06119e2599
SHA16e447218b4f9fbc31dc43661e672cf290c67e157
SHA256d9ca3cf11b568f7be506ec681172edfb6b3545e96f90255326c7e052e85b0fa8
SHA51279ee399f1e76112f6cd00baeae3da8d8555f2e1a5aef427d89fc3a12c53738b5c4b2f6473836ac2075322243032650d713c8b8a6e95cdd5e5ccf4cd3a6b1be74
-
Filesize
40B
MD5129695cb13d7a74b2339de2c6556dd72
SHA1314d3406a078f2c388ddd861d66e41d17985ac35
SHA2562afff6d4c92cde01a63f9c67fa7a035a1ea17c25dc1ed06f59594880682eb02e
SHA512085502747eae8f5927ee5b1bda77ae3eef5a3828de370deb3d2e4c199c28aab2dbd0d5bc58c4a61f582548b11dd865ffa2c21e58cbd9376051ab042c1b7337b4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\3fe9f30f-b41f-4842-a6fa-5b77ff0ed2c7.tmp
Filesize11KB
MD50903dea5cf28b84c0882463af7669c94
SHA17655f55a03653feae1cf88898d3db1c5bbd99e77
SHA2561987e926d49d3217c473c40bffaf3c7c0b4db5da6dbc79da45368d7db6817851
SHA512cd55be9000d46d6f4492df4ce5a63cedf81a7b72a6a762163e4a5c1e20694e9df29f2e7d8e576b1c24d0269239356afa5c9a962617f59abe65a8c007e34a6bab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\98b5e88c-1216-4d56-8293-a5c08f2c5aeb.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD5ab9606dc323b65dd55eae5c98e698d99
SHA1cc4fd7282b0bc69148fe0fa64058a4c0a2f1a0ed
SHA25674f39b63fdfbee8234a41d396efcff4736cfa53ab47e61c0cadf31c43fa8de27
SHA512b3befbe2a24cba6d5803a75efef4478c4edec20ec41ec38e7e89c648c65e234b6e27ea4d0c1f3e9c24fa2835c0ed3b54e56e80c9bbd4ef921bf890f20879dbce
-
Filesize
80KB
MD57da5d6d0ef205490efd839b770160f79
SHA1578221cebebab1a439ac6c0dae0dfd16f2bf7a63
SHA25676c3700c687c6348b1f2b6ac7bfdf1b56ab065d085be995f28a4db6cff0880e5
SHA5125dc9709768f5d3971f2c574298deff5ebd5fba1d18451c3ae47a6fa4ecd761730dcfda803bb55cc472dfa860c012b10b07660f3fa35a5e5dedb88cb9a86ab5dd
-
Filesize
27KB
MD5b07b8d96b10dc66e9b2dffd0577d677f
SHA1d1342f5ada9ddbc8ff6b7cfb9ac2b6a13d6aeb87
SHA25629f8b5c28b9464cf233fc6c0205bdc9a5221f6d2ae6320939bec8807bfe0d5f6
SHA5125f1bc3cce9b36674ebdc9951c2e3b9af5cb7f0660b2847974f94e6e4c5585be136fd8f5cd7962d407ccd6d7daae378ebdcf89deb0c4f9f479b85e89ba11f1080
-
Filesize
20KB
MD5dc2a6466867f08aa8986282c2cf21912
SHA14c5566635ae3e30496bd921ff848f38b5095290f
SHA2563479459441c0a79dc4dfa2c3a5fe64cb4791e57356f9686b0abea319432c8b1e
SHA512c93dc5b0633a04c34bd853a0dd451833407c1b8bfcf1f67bf221b5bef3eebfd50cafc0c3689f3d879615180253c12d024fa64becf84c7d11d4bdf3c48c160eb1
-
Filesize
42KB
MD5c4b98197a24c1bf1d1dc87d4e44ded7a
SHA15bb87686486d5644c991148b5eb49b2548084048
SHA2563d292da1869d798ace4b0f667bc97fa08766678187cc32a239027a93510f5cd4
SHA5123c4b084822d61ecd19b8b40990b995b7f04d90ed51ca2f4e3eb61ce47b2d5e5ab02b8c2c5a413edd95106d207dffb8ffc3e20ae79e2ed8ed317332964481de80
-
Filesize
151KB
MD5be4dccbe54eea47a0ad5d7bb60a3c17d
SHA11979128e8ba1517d85f5e4ee505abf486c51557c
SHA25652bbd916956b4ed8b9d71d1784e4008b207814ec506203326fb36052f3451adb
SHA5127f7b2964cbeca667d4c26a208be85ab5cb77bb0817318fa3b9045643475ad50b0686427f71588ce52f340df9d030a979b12282da36d9cecd02e86962ff21741f
-
Filesize
79KB
MD50ceb2aad0cbd8c30c4edee5e407b1766
SHA190bb129d25972183f30ce24bea35c7b8cd53fed7
SHA256b4316b00e979925a05186761062c461b25e92102a481bf33b879b52d1c865a54
SHA5128f034ae18d5abeb26a9f1f29cbaffe7eb55848a85f84d93a63bc4f96e3cf774b5be5026ca61054607a8b9d69460cd6354a67d559ea89d576c5a58f663f2e9283
-
Filesize
39KB
MD59a01b69183a9604ab3a439e388b30501
SHA18ed1d59003d0dbe6360481017b44665153665fbe
SHA25620b535fa80c8189e3b87d1803038389960203a886d502bc2ef1857affc2f38d2
SHA5120e6795255b6eea00b5403fd7e3b904d52776d49ac63a31c2778361262883697943aedcb29feee85694ba6f19eaa34dddb9a5bfe7118f4a25b4757e92c331feca
-
Filesize
19KB
MD5e8730678d4610fa908d3cba1ef0b4ddf
SHA11efcbee909ce74bf04878d74867f12a1e41ae7a4
SHA256e921785496ed2d98c2257c88a6f838afa6acbee05cb8467048501bfe2a301461
SHA512d7c3f81ad11ac5b3e6f454fbbb9be0940b3e8da93cde0b80f9a91a8259966be466b4d6a0fd5527fcc6c8f218aad8ffd0124bb29dfa08f6ca658ce49fe9e37e6c
-
Filesize
107KB
MD5f2a6ef71eee3103dd3f565e04ce724c1
SHA1aff234a1d1dd42edc28d5943306981e928e3c654
SHA256eee480da14e5d9af6409aadf2b942a521212c4dcf7face9b9f0f24382e467b38
SHA5129946d7e57585cae265b7f3a510b839d6be2b41b09173ad40315e94d895b66e4cfe718eb152e2deae7acd3a79ca1187cf0114afe230f57c95f3f09340f739b09e
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
30KB
MD56fb26b39d8dcf2f09ef8aebb8a5ffe23
SHA1578cac24c947a6d24bc05a6aa305756dd70e9ac3
SHA256774379647c0a6db04a0c2662be757a730c20f13b4c03fe0b12d43c0f09e7a059
SHA512c40f4771c10add1b20efb81ee3b61fc5ede4701587f29a1c2cdde8b6faabd1c76d769bf8b99aa19082012f95d99ba448a472463fb9056acd2e43542e14e605cd
-
Filesize
20KB
MD5cd2b487b040fe8be065187396a981a39
SHA16e7d100191aaf135915aac159f47bf9072390edf
SHA2561441b3e440dc6b2835e410e22d39c07cc1a446c738eeec3d0e1f821b04b3a1f6
SHA51235b182d4573f3f175d8a97cc5875d215650d88d222b72755051bd5ed2155bf96712fc4c71f2b5eb12e0073b8c5eadaf941dbd83617dc92e7c3d725a3bf1d3262
-
Filesize
16KB
MD5d539b638dd41263e8839511369cd2dba
SHA17ed0b62369946be27b368bfeaf75d571afd2197f
SHA2565e18ecc847567b103979c7c5b3f6fe65737c6a6f2a9cc7a87b902fa2d4497e35
SHA512b8b03f7291855db66ce3c9fe4f37efef7a613c975d11e12e3b3e2b02504907081760df49f2a5124795b75f7b4d2f1601ac6492e903908ca0fc0ce7b0931b1ea2
-
Filesize
2KB
MD59e0feb08ba2723e370823af1b0fd6698
SHA1ac0b50e94d418061fbf1f05e702bef1064dd9e65
SHA256ef7fad9a3a779c98015581ec704259ad48aa77ae4f4e0e2ce6a1a04bbf8513d0
SHA512650c8bd3d98bdfd08055159c0b10d4636dfb64469e291baa41a7f566b8cd69b629aaa11a8baee20429beeba4f795963058b16b8c6067ccacc5de5da783360a84
-
Filesize
2KB
MD563ad45a251c813fcbf4f2731023ea57c
SHA161c635fc8d06940337879876837502a34db9b688
SHA256084bd55be83a31743ef0d3ecce9bd60429b1ad630abbab8eb0be672284c2570b
SHA512bcd80fec9234c8a879e2b8554ff7d172c6fbff788f32af7960a153f9e8078467c32c79667db2e0460a249cdc7312a5be080170b5da66ab9bdfbfc6cbc0af6b65
-
Filesize
5KB
MD5579143d3abeb0a09073b232b25594fe1
SHA1a3245a5fb3e402cf201949afab955bf9ecb217b9
SHA256d84c9a790cd9249407f17d434b411d8251c684e12bcdebea5744078f3b5dafa6
SHA5123e723d44d8ffb692d182323ec4ffad58afeebbc2013d7c91e6909614957122f4080ab48360bb3bf217bd65fabe00e50e75214840191a63004fc4dd3558f55bec
-
Filesize
9KB
MD5225837c273b9b84687f90ffa49e1bb78
SHA131bab14684c42e6ef168c72b0bf837b08be8614a
SHA25647d7e6dbfac11b8af40770361d36bf010a80075d4343258a75d5ecb16a00487b
SHA51224be8e5eb08418e928e016dd630df6dd6db811667db0cf2866af4b2a14a565f3b86a2ad90ddfd80ac3147c2e7c118ba7193fa6fcf363d8b5e393e2843f0797c3
-
Filesize
5KB
MD5803cb9dfe42e10ac14a334c50a908ef0
SHA18030a72b423c59580f2e4d6342bffc49eda077ba
SHA256b8cbcca90ce85a87456de61c8bde45ff7af818ff6055f2d5f6b8b74a238372e9
SHA51213e264385c9a27958e0e25e29e15a0e07274bd79e82a06eeea5056bcf969da7bc780c836d53c70a505bbbd384e7d4c5339573f587a4fa27470cec279c83ed38a
-
Filesize
264KB
MD5e74e5fd4a209a6724a15fa68afb5644e
SHA19daebdd41987db29aec78a69bf403315b92e3558
SHA25663b68a76074110dd27908d25858384bf6f2f3181545e72b0528cf199f1634d42
SHA512b5b79bcf515a17ca4ef26e5604facb495bed4f72db2b57ec04aec69e7c16901ebfb972e494b66b23f33bc3a0fed6e5e07bce4a7ea0acc23eb29a7ad57b06d8e7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.86.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.86.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
44KB
MD5eefee5ad5a5b174723fa323ac4f27d5b
SHA1a6ca0b71468c5986d2f1a7e21b83d3a803b8e70b
SHA25612c608c5a39772453aa4f80e9eaeecacc1b7b97a66e88d774d00f0831e5de759
SHA512d181a410587f6ac72cc25ca66aade634f31a0edef9432c4e641ee1023b9a3a5c7ee60d96a9c34005bd0311f1d149a0316af440aa70fd983c356747a722777abb
-
Filesize
264KB
MD5dd515742cb8f4f9f123aa7ee7d5f37d3
SHA17b7da8520b25f6a41b69249a7f10b172f51849de
SHA2565b9483c67c3223e5e7f7a3aca5ac04a37821ace74d700b1f3f0ca1c8bf73c182
SHA512fcce46ff71f4cb158faab1a3f93106b89ede9a53e942672a4acb58e66acce35d45d4bf10c5c0f43c88fd35d0a4aa30671b0f25c9c72266e3c46be60059399571
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
27KB
MD57f1e91f74d104930113bc028c988b51e
SHA13216729750013ea8caa55339c01895741cb7226b
SHA256089ebd4cf5d8b98713b15b920506060af83d1a409e47665b2ff99398ca936958
SHA5125712df2fa1396fe010c4ec750c429e3ab5f9031c64d74c84d50045a0c5c265e80a1f04fef898dbcc4ebe7d24a5a35700f71a6d1009a951664430d287c0d844cc
-
Filesize
33KB
MD58757a6ea3bfe1e003583bf6baf1f23dd
SHA120858271308c7fc4623f93b5fe6f8b92feaaf8f8
SHA2563a92ab474d7b5905125a48399dd82be93603e98283218b1a753c08aebae4f2d8
SHA512fdbeaca4c60333143307dd654a5797a63cbcc343a903fa8a5ba01ceef8937b59d7b188450eec91bbeeb3b26d8879996fd88cb1d9a1f2f20601a778ceb6b97fcf
-
Filesize
34KB
MD5a25adf603b17cd2e8d16fbddb90bcd56
SHA18671f2267d35ec8f53a1607dff77d7a1c2b39840
SHA2561a6648d27051847df2e3ba52d836c7309caf962fcf3556e2dadcff02f942f472
SHA512ed07d23d5677191354a08bfd3ac8c8eaba84b60046838301ab94f4aeea747d2dd770bfc2556230dbe1053a4f877470f4224b86f29958977ef9ebfaa88f187e0a
-
Filesize
34KB
MD5fe3e0fddd9894e7f605c4df795026f02
SHA1d98b4f944dba8b7e67d8d24c406ca2d7fcd40616
SHA256312fc4573e2535aeb8852e0d169a1c0e9cc8fb1b8ab8d438ee408c719be5bbf2
SHA5123ac0600802b2608df2b87e527e7dd781cbbc710560410a2ba4f3ee392b1972773493aa53d09af0ac41b46d8b95ed6a7fddb5339a744d23f51bd2a5f51c011ad3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5c78560443ac239db797f0132dd6d2d91
SHA138109dc316c5261eda0bca00e06797de94d9f977
SHA256d59799cbd2b8f6c6772dcbd76729fc884665dc0ce38c72cb02fdf6aaed211ba0
SHA512a557f82231743c4dd1d5519be541109461031cdcd6ef245aa6078a706a340ef8edbff5232d5bb37d86e0cfc2a3354e268e7a93951da956984404391d286ef18f
-
Filesize
5KB
MD5d9068bc02787f0a071765bd470b42809
SHA1c582e96502c998699793c76921ec48f7717592a6
SHA256d905e505eff89c5bbf13950200e5cce672d2472d36fa02376ef54edac2638e33
SHA512af3631cd382f3361a0c414b01f627ccdafb002b596be49d2e45faa4b51021576cdcb8dbe8fb570ef23aec7013fcdc8a784b8e1419109a74c0e9f1dc083315ad1
-
Filesize
5KB
MD5558c6b1103c925903dc9cc4a36c0cd83
SHA181fa720f5680975b0f6251ed648ce565b796d536
SHA25620a402b8336b7503e0ef253751eeec0343cd4a67a107659248dd23d4f617b175
SHA512c9cd9d2a93c66813814f212f9a7c223ca930bf4d36bb1dc9db4735d93a64e696b641d5c0f0d270e1cc4222a4b1723f36697de0cef4ed4c7a34290604691bb995
-
Filesize
5KB
MD569b79a68d3ff6bbfd89bbb4161eb3fda
SHA19e574b15107e1611f9f441e59cfd1341971cb97f
SHA25698453e6f960ca0e552a70ac3b017baeae716c6b6ccd0416c0b4bf1a24c2111ba
SHA5122d870237052a431255b746b8cb951dfb4d06778310cd0504a6ddfc63a36eec2389539034448c0150324e00c792708c80a8f7288d9f4837edf5f1e153762fa67f
-
Filesize
1KB
MD59a50dd1b424c8d7c0da58ab576d246a2
SHA12b9a95f87c65250dee6c26a4a4e54b44dce94462
SHA25603f93bfb6d158d755b8afa9a73fea380043d8f921f80ba92ca3839e528e328ed
SHA512e1ec6de7632791c6eb221816a2696f4b7dee14863ad7d9423874a434b2ef4c19dc1d0f709ed762999035312486174709b3336ad770ef5270af1c1e97209fb073
-
Filesize
7KB
MD586e26ffcf75def7040075e2ba9d87627
SHA11daae27363188c4fef8a9023469aa52ef486426e
SHA256e86ab46537d6cf1769409284a15cf18caa5c428696fc7a9b1d7008356acdaacf
SHA512787879376d5e7ea191276525d32a91c1b44537a2e7ccf8944d75b023429fac568eaafe9e61a5e5844139c85be01872f71b34414fea3ef0db95b152bf23567040
-
Filesize
7KB
MD5d91c157fa80fb6b7a3c476317ede70c7
SHA133b08d202867d790bbc81484ef7da1eab21c0b68
SHA2568d172be28f66718ff479e0b883c9262458a5879f8f22922da9f52474a12433ce
SHA51259d58fd89a2bc3d5f6cf8484a005fa4e81a4eb2c5504ced23741765abb800b7140dfa2c21fe0dff4b8dbca1abf452a8ea209909a98067e32336bd042757bcd64
-
Filesize
5KB
MD5ec7555f30a356ca4004fc9f80cd44ecb
SHA1c9c30be1110292e24ae7f86eb4eaad7053a9d4e7
SHA2564e5fa034fde8950db335551de7d2a18d9526e93c12f0d705e77445faa9a84dde
SHA512bcc215d65f05d458ffc19d1fbe1dfc3b3d1131d05dd5546fd6b5fdd6a0d55839351f07bd22d977d0d3b955017def05228429f01e85a7385b5079f10233d9f44f
-
Filesize
9KB
MD5829cc7612947c6e241921839ccb9566d
SHA18528c5764181628ef7f667459fc803ebc7c580a8
SHA2562f7fe757b8085785a238de6eac480c7899cdb7b11db3add67e2e737023065246
SHA512e6394fe07bf6a55b00fc5d6b84d2d5cf6472513f197900f4b6d6c767d33a61ff629c16739fbf0d2983920b57a394163f9bba2d7ffc84b1efa8beaf412673b593
-
Filesize
11KB
MD5291e6fe8c8535f43ad130ac68eebdae0
SHA14bce59a1e239a16c43a695865ddff08aeeb38243
SHA25658be11d3be34b80115457f4873f4729b8fac1e60e8948ea498915980553f834f
SHA5121c4bb7338b9bf991be58e132dfb71107252eebacfb9574557ef635100bf79b849f917a5740b4173e26bdea0f39cc7bf081cbce4ec8f9bb76240ca5d92ac462ea
-
Filesize
7KB
MD5c094efb94a27574062021e7c26ce2b76
SHA17fe118d50c2075130fd841120411eaa85bcf7faa
SHA256cffb1d66d00a046ea3d8014dcfaedf7cbd26d7d79fa6d0d41c1986d31a0ef3f0
SHA512a8e179cf01d3842e1ae01f28f1cc9a2e30f3a5d17ccbaf492b3dd107527be88b99c7b2b6a93257ae7b80e54e90320bb5f809acb6a4f24fb25e6fabbd34f8a76d
-
Filesize
8KB
MD5957502dd7d2ee1e189f9585c07bf0cc5
SHA1d0f84ccf02adb06f20c1018f469d6f3817c1fd39
SHA256beb0461c09124a9a45408a054fb42e877c09bc8bb6bceff5b2be2de6b2586205
SHA512d4d1da2ed8f6088a2897d1f6b4f45439c53101eea6dfeea9f31658ecdf3f3432e11f18c38dd9b1a7f2f5bde03b6d5a5931c90b5bf3d9072bd9904c7072b5c220
-
Filesize
7KB
MD5bbdbed879379a12fd99177235bade081
SHA1c3111880feff02e6931d6d3a57db6025df34a917
SHA2566b94633b93eaba1d10884454bf5cde9bf17129978c6096c75d8960a2f94e18f0
SHA512d4c798efc9a5a1cdbbcfed6aa1b5e80e525635a8e15a34192639f1f58263608e0cc3d22aad5903ae56fa10bceceb0dba82bb7dab80202a31e293f036fd1dc30a
-
Filesize
10KB
MD555572dcc15c355ac7d7abf1d2c25b50b
SHA180777923c172138a1391dcadd38c1e8577b90917
SHA2560406f896b1749c6ada777c51486e7ea64b088d9190847dfcbd763ffbe735255c
SHA5123cc4e93c760fa9095dcd5cebce5ae194a9c439172587e71250661aa916aae9264cec33279b56bfd2f72e0b77b9a30f33699a4b209355df7cffdb5fdaf48925ba
-
Filesize
11KB
MD526119ac3889cb2055d4797b23c3c0429
SHA14fbd07d8dc1d3c09ccee1e8ac003cd5e1e824d86
SHA256b788d2d1448e57f0b453d4a53caeb9e413d2aac5078496ffe03c5bca96adecdb
SHA512ba6ade86d6d84053de780a5b740e0b7d588edc43585edd04a387d8d6f390b46fe373361cd2359bdd072fc9c8859b16820af4ef8845fff81f4b6725818fef36e7
-
Filesize
4KB
MD5da92fe684a2c0fecd6f47ebe9e4d9fa1
SHA14774dcbf9d9cf6bccad3388f2e0f07526777c430
SHA256e56ed954faaa165f9378a3c1676416414d08da3a10bada13e12253d661c6dd51
SHA5129939e78abadb81ef4a4c36bc3370cee92d1ae5a328f8d827d1da506156197eca1e7ea1308a640ae70b9a812c6fc515d85456f5c19fa7701552533b21b12e3ce6
-
Filesize
8KB
MD54fcdca29028533e1be621a61a8d052fd
SHA1a0686175293c4f22f45c5291662521f490fa4b5e
SHA256b267be86a9dae96d855014aadfbbba6f22300cd8c0c5e8bd6f33d03953c12f99
SHA51250ff5a6a0e6af67a2e8cbfae19a8831cb7d0dea0c0c429c0a157b7df97d714ada4abf531e83fff1457e835eefe2325bb0772bc473dc8700187ebd1b0cd1b63b5
-
Filesize
8KB
MD5bcdcd743abce5cf143d61e10e06ef5c2
SHA185365631f7413568085f207888a9ba5d29fc9e1f
SHA25690611576114e145830ceed3afc7641f2f2253552043cf4c987f0f49705d503af
SHA512ee00babbdf5959f6590b2e584d8509479811636245a2eda636a321052ef919af5a7c1b789c542c174b911acf43fc7c94c1f82400196ee221ee68666bc9ef3d63
-
Filesize
8KB
MD5ff3e6dd163794d9c626d17fc127d35e2
SHA11639bed0cf93c8d025a159872260a59b9421d235
SHA25690fff630a8948cbeff74a071c3e326ce8e1cc37628b4417814e316483abdb79e
SHA5126e31d00f23261e172060875febe901b8cf77e675c03b25bcc3a51c420978362bbf7265c674afbb2c29339ffd71c948b77825133854414931d2f20574d46f4601
-
Filesize
10KB
MD5528e8a6e55d1b05a5aec52eb3f2de18f
SHA1f42771c34795e79cf7a7307e60a35c1b0df83d97
SHA2560349d05775cff8c0af141fb66869f4e82a933a1cdd0db18e4d3b105b57e69a0b
SHA5129e3b5f7b7edf3ae4516bb781366343a825ad13768d057c7aca169702ef75f95f0ddb10cb7c8e915efe7d5687c2e86d97c66b6151017ca72cc9092a48051a4b3c
-
Filesize
10KB
MD56ef6209a42eb742fad09dd82648446a3
SHA19000521f58195fe84fcc684001c61dee27b1e4fb
SHA2566ab3f998154b459f425c4dc77dcadcb11656c4d33e1e1d5b1ce56c1124c38fb7
SHA512e64a047ed9756bd38751911562f6a4d855e898773bdd40c225b03c4133bd3c5b4ee190e51d093eee240ac3943cadfb8cff13948c4488ab0fe4c16b622324d087
-
Filesize
10KB
MD5182ee6be63145fe46781d23a675c6429
SHA1314aa64e35df4028a3ea9a63d76e65dce8c9df8d
SHA256a149e51c017c7dc691204a5990355ca937d3e5950efdc5e4f036858a44c2a46e
SHA5123b3265de47b41174d92219718c2de1514662a008951c39f9a4cd5b327faca6e507cdd80aab91888162e51f33d45029c1f5c64e21d8fa8226a677c20253013edf
-
Filesize
10KB
MD5a06cdbe4be545a88fb23c5036b0a687e
SHA181803248b07b068b33365761380ff960528b3113
SHA256c40b2df7cf9498fa4b8e533b39871e34f95730b6829d5a9e55ab3f34a2606d72
SHA512f1e608e5575d0a72d7f6ef3ab80f82d4325bcc4fecca125d919a695599fa32281269e2c5a67f95b66a11759b0ea5532a54e12ebc9646ff6678ef11271b8f76d4
-
Filesize
10KB
MD54f45e134a47510a726d218bca15b60e7
SHA1bbd52bf59fae155d5e6d59e3c14b80532853e2af
SHA2569f4f75e35d4f0d6b07fbab5c3b99786be8bbf29737f7bb76a5374ba147d9abbd
SHA51242c20e9a4a1e7e15d57e840fca6edb4cfea4e0d0bfb5d35947c3fab35776460f708082408ed9f5f0165c6996fe224bd2616f1fcecd23d275d978e8bdf3592fcf
-
Filesize
11KB
MD57af6d7529f900b574f5098738b52a75b
SHA1c9aa0db58434a46374bc934fa0c4e626e0416f2b
SHA256bc126142b212d7a291d756ffc302dd16c9eefda4960eadb82ae8de12855e6dbe
SHA5127ed97dc1c7dfb1387cddc18783ee493334d3e2d0a996344c5517dd00c95a779d546d11def55707ce990037fbcf47924c6676fae276a916b023d8d0f875c7b806
-
Filesize
10KB
MD591512e114f6efdb02e8b3fa56bee8612
SHA186ba2fc57973fb7448c7113b245b12a02e1e1245
SHA2563c4dcf789791d18e5bb1f7a0571ea954daa511df835d4a1a96e80b148f50a085
SHA512b4167f57046712c439521e51570672977d1fcab06bd563cc3c793302b862e25f56f3ef7bc2cb0411debdf46a95c4133153d8152c57da6fdf12b14c05443dc0e7
-
Filesize
10KB
MD5da52483a7ba2050590cbca5f00ca1673
SHA1475b28e69bec4d4d21941127391adf7cd9a5b1b1
SHA2562e2832bdbb98a094ceb504ef68c2bdce2ec0400762947988487c368c689fcbed
SHA5120bd6634cfa9f558df42f248e97a1190cb262f927cc910ae1887da49e4aae4b1b4d1da06e6b250efe940a1021de4872fac0744401f385be44abd94fabd9eda3db
-
Filesize
10KB
MD561f4062e881acbd1a66ffa705c3a5ed4
SHA14d68ffda594a0ba604e1e33eb771bc22500e898c
SHA2561e245169740e7313810cf41818f0b14021a25d5dce3c2f45021d9c6c53d60467
SHA512323a33d7fc70f93f867dd223d1631a28a6ccef215541e3c0b36cc1bf9ac9b4814c9080c3d0eae4515498c4df35369d2e85579cca4cfe38c5f1af8d89e80a137e
-
Filesize
10KB
MD55fc564190c79413971ab1018db37d25a
SHA12220388edb997e88793e19a9d96ea921c1b3de1a
SHA2564e83b0ab13487f2af7649926eb34a6871ebb0b7475b51b9e2552ae4214f64493
SHA512908dbfd20232d153d511abc879e7b79e9690f4e93b044e5c849393a818f41de4ed83c120fad885cfd8b73d7839f85f48cf9db9bf6c408d43c35d17a5aaa263f1
-
Filesize
10KB
MD5ade7c9180db6fd020f78db32e65deaaf
SHA1379e61fcf1c830501e865dec4db59ff89ac0650d
SHA2566fb1109246465136e2aba39f43685143806f7022bfb92e254b5c8efff6c6b55b
SHA5127f1df3ac5161100695a2485bdb644181b95b4849b875d31fe2bd0302c2d0958f198cad6d97f131f40fc4b491cf0bff684a82948fb93c72fe2172bd54bb2df795
-
Filesize
10KB
MD5a01410450de0e6b128b2d6f2038ceb28
SHA16b0c05def1cc866a3392e91dcb0a9fb81b39df92
SHA256ec6f13c0484c0a80e52edecb48234b5d1b8f3be50778e6e4d829781bb8eb3306
SHA51252da97ac3e58bb9fa3ce3de063134f2640260ea8fbb5a2a11841f39237cc1c253682ed89ca60a47550728abbbab32fd2682f71fe7faf2c618c9d3edc6d8f2b1f
-
Filesize
12KB
MD5f7254a056fc4072df79d6b33e9e0e9f8
SHA16061562c5059e350052000acedcf7be3f5f16e71
SHA2566b5b353cfd0f861d9a5fb99a98fa8717bd66c951e28a1dbd85ef47491584730b
SHA512dea3ae48b156d66c160e47f7356f02f39dba767b4a5bd4306e6665591df65c4c3157e8e9e5c17a43e307328b2030a84fd005c3fe4886581cc2d4d8dba8b7693e
-
Filesize
12KB
MD5d95fc2083fc5ab9049d7a67d3e214885
SHA1208cae2a2fb68e609c2febbf0c45828678c8c8a5
SHA256af5ee111afbb714d7267c65f2cced7fb33c45b0f7854eeb4ae51df94d8e767dc
SHA51217b43f7ff49fd75f607e77e825361f66536bec3cead28e3cb55aba8970b1f2e9cf27764a9193a0b21366396a6d016174d222c469ffe19b0a40dca722d171a07a
-
Filesize
10KB
MD511480c357cde86b41b2897a02d8a68ba
SHA1bf92805c463a82eff76d3c63824815e1e6b45fd0
SHA256affc8eeae8ea54d30240285b4165d58c8cf59da68a5e4ee6ce272959aae9bdb4
SHA512621146d7d8474b907558457fc8dbf4c33c2a1c9e3f845eb645d2d48ad071829a49767f5cab21acb3ef4d0d440ae4d2a361d48638b3158af71d89a2472ea2f7b0
-
Filesize
9KB
MD5d0724805938d8286464af8184e19bd35
SHA13633deabeac2027270fd522ea2559b99185af312
SHA256a04fbee8a7776f1798b680dd3f203669c8687f563bf2f85d5d7ad53c1c2bb64e
SHA512f39471ce4fb13e31982f405ab3a1c384b158f84e00e4ab5239136b48c4f6f06e1c74827ba206e1777be97cbf97776c585ee88b49166fe7bf961298a4ecc2531b
-
Filesize
12KB
MD5fd4265343986e371e6915442101808a5
SHA1e12d891cfa5d7bb8357226aa1df4f4d45ec24838
SHA2563cfcb848e28f1608fa868e9536f95ca909fd22820d44e53cea8fde5d1212ee0f
SHA512e4fa35040b56f165b307ef751c3c54b8aec95823add739355947a9655d7e1207c7a91f071b071e8396bc39b771098fbce5a1e2a32972d6c9909b60cc48d5a0fb
-
Filesize
12KB
MD596ad30fe1e59c278e3d32e825aa68aaf
SHA106f7308648bbfcf314953d975fccf34d993c6323
SHA2567b97a5f16492cc5c1926e7b2ccc5479d7d17571360a85ce30a59cc8e578179d4
SHA512276ff5024b8ea1473c34daa57a474736a276b20393bcb8efca5efbc4da3b9243325cec204daafa019301107039be88dab26e7e4713f4e8eb5507e942a319378e
-
Filesize
12KB
MD508c60bc6f47bcb717d4de4e05f52fa95
SHA144a345dd33a643aee29460f6bc507db653f6ca6d
SHA25656e3fb65eeeee7a56c27db6e123e5176a89aae89fb60a2691c47765113e35feb
SHA512ac0007d1f92c83fb7e92cbbbfaa22531989939bd0fc778f8d44842cffe8735edba8af1af27b99e18984c6199c9d31e7975cd6b335b4a986c60757b9246ed6856
-
Filesize
12KB
MD59418b3f7b8c59baac518def2263ac3ba
SHA1ddd6088ba57751041de5e6cbc6ab5ee9be1e6c4c
SHA25646a3f2a61b04db2939678e961d702fe910f0f420ec716548401e8d14453acabb
SHA5122b6819a89d429057a83df569ac9f1d13f4a5bc4ea3e05fc137bad4abd1729849e430e9fb0d9407aa9a337b9641a9e3ee905a4784711f8c9e050341d6707ab466
-
Filesize
11KB
MD59ef034003c497dc3ba03f0a5e114cf60
SHA19d4ae17f2b79bf1eeb3a417489fca520a2815478
SHA256edfd9ca5342b3a0e4845b4c8bc9bc280d98c717c55c00b2b4742d91631e2e6bf
SHA5124141b3f035fe9383086cf7f64175e1441e0100b148a11c0133a32030e90e0391df697175a63762b9ddc86c533f50cb1fcd03547981651cd979544448c053d4df
-
Filesize
9KB
MD5a8e487a46a211d94e389beecbb31fcea
SHA11d01bf1cd1fdd23fa185793553852c3840b4f14f
SHA256943389de864eec3df62a348cef7ec7372022cff248b053a1451729984031696c
SHA512dc4f06990903da20f44df5901c2f84ae5b2864dfb2fe956b936deb8d76f4f11b317de5103dc847da2ecd592b0c9a5ac5aa840770bbab480da0237507ccc2693d
-
Filesize
11KB
MD5b3ca247026c6e30052afac0bbf46d78e
SHA13d5fa795b7ce9368343ec3f0c9fcf9b5d04d89bb
SHA256eb55b1344c60c6cb586165e315f570c4cc2a92d3df88f6e0530290554e00dc71
SHA512227cd9880990761fb7edc1e4ec342120d6c41e73069a7c79358ff5dfcee9762515c5acde4c9ece8de2bf4c69d5047d7108a99242dee6829f1feeb42a9d0c04c6
-
Filesize
11KB
MD5d8511ddd9f7a78b2408a9e4f4a3ba087
SHA18c8661b932affea0941b41501450acd23c68b79c
SHA25653de76f1b26b50155f4f22b54a139e40e675e9d62d38a3d039ad0dbb92cf3afc
SHA5124d33ff4fa2d9fb0df81a3d11aeaeacbafe45e08512225bf0ecad9b29eb7d4f212b12fac759c1b128e85ab6ee0d3256aa9332db5d8144909437a8a31ada977df8
-
Filesize
11KB
MD5db2d212f40988a0b9cd2badee1436f32
SHA1daa4e853aed09aecf45adec0fc4eebbcb2849940
SHA256b54868a0d2921aae90c010a6fa050587e72e9bef52049842dac3255a2ad2fda2
SHA51229487154360e83bc69137c71ac25ee5e08b766e1a06a9931a0808cb81393328b87d025395628a9b15bbf427e3586c7a4d7317ffa4b9f2dd571c5993ee66ca3f5
-
Filesize
11KB
MD5389fa20d41bf65221a3db44de782797d
SHA13ae3ec5206bb33016ac47f4c051051248dabe7e3
SHA2564d5c6f8d6d217ff5bcc8a6aaa3bd47e2270b63f6d9f494591c47e59ad2d56dfe
SHA512b950247a7d7813441d430d696cadc7055f5d9d334626092fed77abeb292e0da31a2eb553c336d97637e16907edb66eaceb5cbd502742c5e01de41c6eef6c180c
-
Filesize
12KB
MD569cb2ef0b337bc6ca8f3c069276cfa03
SHA1fac3340e6723a364297bd119eb3d79ea06c88885
SHA2565a8441425eb053f7f55167659b4a75cd60ee1f8b7f5fd685570e17c047165cf5
SHA51299fa158729c11a36bdb849d6ad1da845da3351d62cceff15d7dca011e7b34df592bc1f1928926aa8e8b9b06ece3212633b980ce576d16a2409d856cfb070f8b0
-
Filesize
12KB
MD534da25cc8aa286cf23c42d5e8bfe600a
SHA1e4e13e31ef68efe953ac0c9c177372c87dc8c9c2
SHA2565c80fa6879a5411027e6745cbef6957021f78a936fba308868133620d73143bf
SHA512d765bcc7d3e43b1312ac67749db8442873634d7744f9a6517da588eaf6f4e81d168171b6c737cc73ad5b554296254bec9349dcd8b623a72780ebc9f31c29619a
-
Filesize
11KB
MD569565153a5d5f64299b9e273e883a8c1
SHA19644ff88c06ff36ca0d2b4105bfe249d69494ee5
SHA2560a75d23079a54a049c1b6822970c25490245219a2313cfee743b84006fed74c1
SHA51226fc5b6c70c664d7973be49556141c51dcdca019f8ef033fdd6ac05d92d1a1871b8a17aacd4ecca5697c083807c03986250314cae74f314b9a478fed738abc55
-
Filesize
11KB
MD55bac2740aecda662509bbf863a57cbe8
SHA1184a0c9c4b86f090ea58d9521c35dc1fccc6248c
SHA256899e1c0e6cd01c893b300f852180df9946524cc83a3ae4c46f5426e59f6899ea
SHA512031d1bd62b37e99e8b92d3fb461bb20b7e2b6bb56b706e7d952ec5a3d44eb44c91580669deacfb9846879a6addfbece076b419d70ce17542f1d4196beb90022d
-
Filesize
11KB
MD52b37940bf231617dc5819eebb9ba634e
SHA127c1e91d31bd6641bf6bed827a2ef20d8f1f42e4
SHA25693ea09a03ed00375659df999d89b50a43f4c348caa3b62017970be9e349045d4
SHA512cf292e2ecb1050f9e4b9898b9acba39eac91372575c67314cd8d5b1983ebfd856769421bf6c3c8cc0b8db2f145fc5da12dec0fd6b435f8e24e7b876ebcd126ed
-
Filesize
12KB
MD542d26695d7dfb8ba5ca40a7b12f6b198
SHA1cadb20da6f092ca374d53cd8bd6815625a2e2857
SHA256062d8b18e662a5df50afa0c31e75fc1cc9a1e5b87f121042ffc0e428626c7206
SHA512e932563b8895614d4107daf5afcdb855663bf0296c3d97d42c1f5b7fb13d4c2793ab79866805cb764385c4ac7eb913a8223b4483f2f294ac316b5783a24d261f
-
Filesize
13KB
MD53b816a4fb9f163c2156188485271adb3
SHA185d769d5b4f869ea045c0b5a8cd93633ab04545e
SHA256db9e922277188488d989167745e279d5b3cef14a4b77fec0445d51d18743daaf
SHA512f401371b53b5cc12ebed8a15e532fe8fd7429ab156019f17d97940a863c57c0b43abd49120e41c721297635cfa1f5c0ec4e720001da92973534f81153e4349d4
-
Filesize
11KB
MD5fd1c4ced15009769914fdcd4d31a5e07
SHA1ba00a63818899a5f489bbf78bdb0a3df88557c88
SHA256f6148aa1ef20e8aaa52ad1b541e005967c74b0ddcafd27d25d5554b15d3f09cb
SHA512ff9783546341673d89c5a033a59e0cc831b06a860295622cd1ed062e96bea6a83af131f1d831ef365c5ab59ff99fffdcfba369e06ec939ff76b9b69a6fea4c22
-
Filesize
11KB
MD569579bc930e4dd48647f9673b6a11d8c
SHA1473bd1f0998330436f66ab2cdc21662ba942e5c0
SHA25617959c596f4303dd962d76ebde68bfa49a7a0952f2c639319b5ba6f29dad24f3
SHA51219f7db33e0d8ea059d50ad53c289fcaafec3c23bf1c87186c907bb4403441fc8820b27bfacfff49b06e63b162f60c076947df9b6e653c84ca19225466848abd5
-
Filesize
12KB
MD572980153d3e84f1753495cb8734f7b74
SHA10c0fa68b117216296e2f2931a13c237789f661fc
SHA256d6b07b563d6168372a5b52e76d2fee963bd95acbc1d2726e62e88203869b5458
SHA512f323a7a73a0d1a62f543aa91af8d8e661b541c12a72a78fd60a11d0b31aa67a751bbefb4aede0717a977900272430830cbfe2e0469a36a7e1300f9ce97dab309
-
Filesize
13KB
MD5ab7ed33b75bfc89289bf9dd217de05b0
SHA1ffa230609c3ca87bcc0ceca712b31e392beadd3a
SHA256ffbb4086fc1c03946b7ec43c03aa5798318c79242b9b3313ea06ca87b399c9a8
SHA512041abd4e9463a4afdef6f05dfcd81bb06b85c14e9a10a50c3108339b954e6e7ac5008c686fecdef88d5d1387e71843a3fbedb67765e5cea6f8d3494e7c4e1bfa
-
Filesize
11KB
MD5eb2beaf50208ce947c0a093fce48b932
SHA16b475ea749ca5431ed40ada0da7ae5b5ab1cfd22
SHA25685bb08f18d642986ff89bf8e183d6efb0604a14ea1f8b7e89b5543a3272ce974
SHA512c551cd6195ba9a8e363fabcf6d282c31d9e9aad6b5af92aebb3fc8986657f8cedc05ae2e246f03dad845f0c3d823adc89fb18b7a712935ac3e0bdf5304fa599a
-
Filesize
12KB
MD57b633a8681534a5473f4456b4e420315
SHA1ad37c0b8520e4c2a87c05c86ec7dcfaca7b2ad0d
SHA256a1a2ef5fc4894f0d00c5ab1a58181dd1f1e7f8ceca9d91352749655192578367
SHA5127722dfe9e52631cf30cd709690ae11c49fee5b4e81e1c97a52f8250b739027fdfb5c024f5c192bbe8864d969647f56df44e9e59af61f726858e9c4f5d5730c46
-
Filesize
11KB
MD580c8a43845b585a8cc25e34177acee93
SHA1892dd3c716c4fcba2424c88f70f666b9356a8ab8
SHA2567112ee4720b7352c9956d0e2168e7f932ece06f25d36db2a129d920e2ebf3d77
SHA5125ba420f88629f8fc2770aaaa052aa6aadf1bfa027438618a72da5e5080b13bd40e7e47ab0c2cfc24b0b291dfd53f49007a62e3d3a48625b7a32648383bee55c5
-
Filesize
11KB
MD5e61bb046f05164c8d1a315d41087d661
SHA1ace8f0891d09aa547f9d8bbcfea51aa2b9ea9823
SHA256528d8b6d09731ee77ce6275e01a6256f5a1b093a2093eed27ce7faf63d073e81
SHA51246f3e315164fbb042e03aa4c8d6bd795ad61cc256119bf3d5e411d5fd8f2fd89985e962ac4be3026a29fd0a5d70ed881eed7002075feea51221d624748956edd
-
Filesize
11KB
MD5a7af4c0f29489c59cfc91e54c4a648ad
SHA1dcf10248c80f74b870b2b10b4cfae8e50e3e00b2
SHA2560002b22f16e6b0c2594141874833b50401682a4f59c84d99e8534d1a7374f75c
SHA512c3cda2d021e17460c064c6526f426b3c6e6bacb178c9e57d80a3b7b34cf86d180f761be1a3df95699b9474423b3f3a64510a4fe339296551c6f9dc2de01bda93
-
Filesize
11KB
MD583fb75a5c4089597bfb6de565b3c5ad0
SHA171826dce14e9abc5927716ff9684cec4ab411114
SHA256bff0911d0a80f97e1ef0a284fb60f64f020eb48fd7b7611f47a618985c407f15
SHA51298ab8dd4fc4bff437dd882f36cac80eed3583db19f90433f78415dd79219a49d36fe85941480270757e351f0038b77387ca59529a80902298dc00915c1f8c42c
-
Filesize
15KB
MD58b724f85a7c218de8afdbceb3590eae2
SHA132846f51d7601f11c91b04bde94088e6ca1a07d5
SHA256f6c8858c862cb898dd716c78f35a95cbef8cb4e864abcd7babb921793eb5791b
SHA512759bd4754c9cdcb4334d7a599f05bc880aa81bdd48b09ac2d09c203539867ae9437f160db9e5ad30257766ef6a4285b006b521a3938d9b253fd8cfb9a6d0adde
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5b4a2bde6afc51da4ef7c17913ba999be
SHA16485d1355688263a4cbe57a4e1f5d3f3724cff8d
SHA25652d4359854ceb7f8f3b7ea2d137f5f3f6b3919f9e81ddc008536d6c43f5883c6
SHA5122afaffd2a26ff257237041b2c58cd9978975f3fddf370a2d206b4bc4973de071a24be06c207c64dc2f380fb3149a05c6c3fd43e7d53f03480a035db629482728
-
Filesize
44KB
MD58efa0326b0748f3d9385517f256a7052
SHA1841b0452efaad3384b96ca427b280eb25630854f
SHA256f81b2439d37a55b964dd21cfe4c791ee14fa89fae8fff72da86df946e704485b
SHA512ee8360fb51cbf321bf8fca14b33735f79a4136fb4832a8f12d057588634bdd21df823417ac56be36e910532d8166ff1b360c154caf709a053ebd4be98f1d0eaa
-
Filesize
264KB
MD54c4e063a67799870ea7cb718a99c28f7
SHA174450a0c3ca6910e093f46e7cfd6a242569e58cc
SHA25622cd0acadb59d4881776798ec4a9e0141cf58c7b7fa7113d18b7c968a98601bf
SHA512c3c5e786f902c5fbd1dbf5547f556b05a4d7d71f2eacd90040b85a35d53245bbc1b956da32ef5e7ef5a44adf5840dbaf257a5cfdd1b0776b7ed1696cb29876f3
-
Filesize
235KB
MD59b61ef8b32f62eb05d34672e74c84692
SHA154c0ba9403344e735158c4ad94a715a56753b6f3
SHA256e59c9a2619e767c3d378329a482d1391dbddfaad51edb8c3cf69197d7056ce65
SHA51265167dddfc82758e44b98f23e47d1d80f711b058c9ec5fa6834a9d7ce66335b0ad7d24a635ab002552680d802c4c0909fc83575dacd4f1eb0bc88deb5051a48b
-
Filesize
235KB
MD56f4b2a4568530856b8e55b1ac5b9d903
SHA1d9830f563c06dcc4e91f755814ce8aa80e7a29c2
SHA2567a698520d512a26d83e8724478050a85deb7a71e8a5e5aa9c602711f82fdd01a
SHA512360fcd5347aa58c9b4157890cca0a822e067c5f9228920fd0c8edc1b20295bee1bc5849b8bd76baf6fb2c41661812971599fe3d5203cc14c6d179dd0b8e9de1f
-
Filesize
235KB
MD533d2e7ba84e8aecfd80ed076e0d8b35c
SHA19e3880159d135cacdcfa9b0a3e617380e12fe214
SHA25618f0e30dd062cb81274937f45eb28ed07c24a5512b3a18be03221f0a409434a5
SHA51260b4098f54358172b01a980c9e44663093803e20181f716f41544c0cfe24fb1ef8f113c99e8ac4e707a5ecbda146cc51aa635ec8426493c20cdc25ba1263a05f
-
Filesize
235KB
MD5deac5262078108027dc817e287dd6167
SHA1dd97dbb937560f225e376a8958bd8ade09d0d3b5
SHA2565b81de24bf26b8f4bd679b13440cf7c3483e2500dd3c0c30edd056b7aec8dfd5
SHA51241f2e3f42843b3ee7ce43d25673c7070fe590f0fe47b45a22305c532553e483dc89f2dcca11c513b96a31859fdd8d2485b13d988cf4d4b3addfee947697cd606
-
Filesize
235KB
MD51cb41fdb2feacc953106d3c8dd881724
SHA1228e684ee42b9ba41095b523f84ee6b71200362f
SHA2565437648ca7f098a32a64ba38d53499aba7e86689d17ebf14492023a7a7b8e193
SHA512da671042034cc2e36df1083e60420d3c80f23feb0fbf0e35bb1a8848e87c0e1d5f2a5ca7931bb245e530fcd7fdd922c0261d3ddc7039ff7fc7f47ff9d51622fd
-
Filesize
235KB
MD5243878c4fb388598539a0862eee06a13
SHA13e3df273551a4f4524a0ed9c1f2f04aae9c9b4f9
SHA256fdfcb5aae35a7bf9846389e9951675cefb317d7d852c316febd0cf886ae74c8a
SHA512e84ccec0534620508629d26029a86ca39ef99f0ec125bdb15b5ecfbd3292e987da522e80809c8a304212b4fd85c87245b8b2ed42e008ea48a8cc3b2cf6436a40
-
Filesize
235KB
MD52d878ec3fde81647f7ef9d61a865348b
SHA1486592ec96c6c9fc995b7e278532f480bf9aee94
SHA25646cba29e348ff591e20d69c4974d99aea741708d665c4e837767d415f790107d
SHA5122483874fb5bfdcadcc2e3762e8c659bee64c08e0b69d7d3802e5afc467f4300087d1f1947241c0d82f49521690abcc5da0cedf2c29c5313c139dd8530c826c06
-
Filesize
235KB
MD54aecd816ce196edeb64dc2f601e4ead0
SHA1770fb9a0b35f92d787634a7478fb6cf0f69488e2
SHA2567c94bfb75e542b78a8cbb65fdb146f3024a15bd594852eddaf32e8b39f4f9ff9
SHA512654e68e83fcfb077ec8bb9db8b8f1d5e1df04c394005eb923c4830e637e9d764c3a0c020cd91d533773e0ebfc8498af2394d77e79561cb579c9ebfbf8bf9c74c
-
Filesize
235KB
MD5f501e185b75a65370ff23588d326c207
SHA11200e356535707abf0bb47f878f89bf00719b1fe
SHA256c0b8dcf9cb12a98ec6b88c05129fdf4b52e081c17a5aa52dcb810580d2537b3b
SHA5127338ff768e6df133aad69de40be285ab03177be9fecb79254f728dee667de18340cdcbcdd2bce5d396edc8ba65b9731c056173e32ea49b778a14a40dec5136da
-
Filesize
123KB
MD55a3dd243d43bed17818e5129c0b30e3f
SHA1da63c60be506c3da1bc60826d548fc5dba83e0df
SHA256737448073b4577f7ea5765491e1a9d3ffbb9a8cf9e0256e048011dfb6b15fad0
SHA512003278f6d2fac200c7d916c8037e03ee55240c1da5f976410afde582a0a1316ee5bb91f10d6d145d4b8fca85e4a6544e218b38b89d255f914cc544cbe5e2222c
-
Filesize
123KB
MD520d00a69834015fc71673e0c10b533ca
SHA19b801b8a982fcb9e67d0dcf141aef25b869e2f91
SHA256a4baf16088f40496b70e8559d36df3f5a0658cbf58f1c97e08002312f0f5821c
SHA51287d1412619d977eba8b7c3b3f6ad345eb3fe49633da3252f6f7109de84147db5a0368bf665aab75047df1b4bd44189e544ff501292a3af451c14267935f8d4b9
-
Filesize
123KB
MD5d74437a9cb1b9c1702dd77acec10dc8b
SHA1da1b178dd4c0598ffd7c4eb27258df1ffdc6557a
SHA256543708bf197fe1d1b6b183c692eb1c1e23945b7fbc9a685d912f4caf43987ec9
SHA512535d3ed98d7eae914fa21d1ebfd2daa26cd6d0300735338cd0a94cc42cae64e4a5f2b9830c969c54680b5653d6f6ca62d987e637a08b7c81356953d30cd08641
-
Filesize
150KB
MD5240cd355e89ec1f3566bb2ef1f361dad
SHA12ade60eb20f0fb16657a4fb024d207a931dc927f
SHA2561f0388d23a4d8492e2f9839392b22a6957deae8750b60ff860ee939811594295
SHA512961fe2017949d185761d8491ab4f7f2ec3b0562cfb6fef202c34d685a87f2ea032f53d653e4c1d492dff1fb43d738e7727985738c1a956a1a18aae77a3d7f3b6
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize13KB
MD5f2b90ddf3f85f1306138002dcc3c8dc0
SHA1d71e5f330ad43c4915097d7335440be5f8d2945a
SHA256fb7050f0b23e1b709f3b11227f1e789815b3249596160438b48d53cc6b87904a
SHA5127a65408d4143196fe55d54e97bd216a99bd15f242cd6b926162d63b2f51e76cdf2026a10033cbc135619aba5ae9f611a00c98f76def51328dd90f2ea2c1d1bdb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize11KB
MD5f9f4c45e92896241ee5aca3de069c52c
SHA1d3937682e2a464ad7a07a1712f69b7c6e5324e45
SHA2560688b10f55e32eb7810c52e25833d7223e167bb7c7a43bc63fa7e293293abab9
SHA512296ffeedeca9e854d00bfde9cd324066490e6491c90b64e4a2ea1bbbf04431a03496c552641f3db22356c4536d9e95847a1eed7c8558d2a1183f4c4644353b97
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize20KB
MD50c9345a09c3bcc7f682815b4a540e56f
SHA1641f4da1b1648a91409a04b8e773ba28bb4cb5f7
SHA256da19237c451a2d9f5a1426a19b43283989b07fcb661509ef5c6ca752913b2997
SHA5126e85632619fc118be8aac4081156dda26f9e08a2b5038a6566b572f7f235f276658b49d35bb0228bc8c664d0315e034689bdbc3142cdb19345431207f25cfcb4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize15KB
MD50e94799e242df90d287eaf7e42c04a1e
SHA176b9cbcf9bd31dc7e921a2585b66475934a70c62
SHA256aed4f072d09d296d53920ce565ff28b22f2b380b995ed0470da88a0b8d1bf194
SHA512150ef6d392cf36f602dbed4617183dc0c2868010a8b1abb39aea299ff22d33e75d067052e6ce0064afbe0db903384430f073aa448f7eba81a0748d41144022fa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize17KB
MD5507bbe2febedbaf85137927845166ab1
SHA110759fc9a0c627aaeb8485f0ed0b85f1339789ee
SHA25633ff29e390dc35f0a28fdc83c465947de4eb253712f7482da49096cf666075c9
SHA512cba8a16e488d61ad017290775f547c8f2c0cdffe40bc3779b25212e188f5279d891e32b0c8f10aa6eb4c8c6b360c2bec8d44b672a97496362df58a8f2bef4381
-
Filesize
3.3MB
MD513aa4bf4f5ed1ac503c69470b1ede5c1
SHA1c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00
SHA2564cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62
SHA512767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d
-
Filesize
4KB
MD5a8a3944ad1789908364a2ff9e8d9cd02
SHA1a8d3e3541ae4bc5890e37416b98243ff895f7973
SHA2567ab270257685d31313510ddebc9e4df2ada6e1471a9a90cc14d23dfc2cbd48b2
SHA5124ed42003da939b8c3ae5dfb2bfd258602ad0757c85d7bdad9c6bab1cb085dd9fe68d5b6bc230ffd9c8ce38b46b0851a75102d9c594ec749ef21de52b925e139b
-
Filesize
372B
MD581d0d47d4aaee99e4e4eee625c7057bb
SHA1073c15cec2fefb3003c9d17af7730e018bdfe6ef
SHA256d913a4ba1154153fe45f5251112a206d70ebcda47152c80c14548e4a634b1f25
SHA512d686edf8256bf57f5b252d6766fc23f6fdbe80eb46cececf0ff9d666e3ff08d5a1a399bfafdec1f1a5366102ef8181c510162683bf48a0a366cff73ee2b8691a
-
Filesize
422B
MD58048dbaeb07d00fb464c6593722ada14
SHA1273d8e33a0e0972c466a9836da28a0a30625a59e
SHA2561c5e1e02f152d9cbe4fc4d159c969358f83693e984f4922c9ef2b65ec79cf7a3
SHA5120222ad6372baba1360e0dcb04af3c526d13c3ba6151b5bb776c7724672f0168761ce949145b33d575055d11ae8301642314cf828a0b55fbe85a5a8185475d2b5
-
Filesize
2.4MB
MD59dc4f1f432d21a1b16b1ea956e976c49
SHA18dd8f2e19741ad3387110875969f89e8fdd7236c
SHA256a69bc1b3ee708440bc5022a053b93f3622d22a677a472465d41b6240e5bccea3
SHA512834808d6ef53dfd2f5c479abffb9fe3cdb6ec1bf8972bbd4bc855c6e097ba31955d6d9b38c71208d24b65ee1f73ce2a1a48246de3391c643d6987d9e75762b12