Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-02-2025 22:43
Static task
static1
Behavioral task
behavioral1
Sample
Chrome.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Chrome.msi
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
Chrome.msi
Resource
win11-20250217-en
General
-
Target
Chrome.msi
-
Size
14.6MB
-
MD5
1ac2f26a8d6237713f6120d9272de355
-
SHA1
20f8d75d976f7af644bf8479ab1e611fe5bea55f
-
SHA256
1924b09ff1e25fe9d39bad70f094766863f366543658627fe94f435b07da6109
-
SHA512
150b5c3693c65d73f9bda9737dd560200abe1c0f95b1abf8e42ea43d80878fef5a39e9410b671ed4af1514e73542931aea96fcf7824067cca886c413672fa444
-
SSDEEP
393216:LBfMDSDSK12jqHzADE/FxGAl81nKJJ3g7xM9a6uAAARWMgyeG/z:5Mg2jUziiFxGAS1UJQNM9aE3RW1yemz
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral2/memory/5568-117-0x0000000000400000-0x0000000000BA0000-memory.dmp family_blackmoon -
Fatalrat family
-
Fatal Rat payload 3 IoCs
resource yara_rule behavioral2/memory/6124-210-0x0000000010000000-0x000000001002D000-memory.dmp fatalrat behavioral2/memory/2328-215-0x0000000010000000-0x000000001002D000-memory.dmp fatalrat behavioral2/memory/3384-225-0x0000000002A00000-0x0000000002C00000-memory.dmp fatalrat -
resource yara_rule behavioral2/files/0x000c000000027c9a-66.dat vmprotect behavioral2/memory/3476-69-0x00007FF6F1B30000-0x00007FF6F20E9000-memory.dmp vmprotect behavioral2/files/0x000c000000027ca4-112.dat vmprotect behavioral2/memory/5568-117-0x0000000000400000-0x0000000000BA0000-memory.dmp vmprotect behavioral2/memory/4152-114-0x00007FF6F1B30000-0x00007FF6F20E9000-memory.dmp vmprotect -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\ = "Google Chrome" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\StubPath = "\"C:\\Program Files\\Google\\Chrome\\Application\\133.0.6943.127\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Localized Name = "Google Chrome" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96} setup.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\D: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\D: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe GoogleUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe\DisableExceptionChainValidation = "0" GoogleUpdate.exe -
Checks computer location settings 2 TTPs 11 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation GoogleUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation chrome.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TjNkNpAilaYvt.exe.log TjNkNpAilaYvt.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer chrome.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\bg.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\bn.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\gu.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\lt.pak setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateCore.exe GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_uk.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\ms.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\ru.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\tr.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\ur.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\dxcompiler.dll setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_ta.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\fi.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\hr.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\optimization_guide_internal.dll setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\vk_swiftshader.dll setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_sw.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\es.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\mr.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\uk.pak setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_de.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_el.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_pl.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\133.0.6943.127_chrome_installer.exe GoogleUpdate.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\guiDE3.tmp GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\icudtl.dat setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\am.pak setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_en.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_sk.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\ca.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\cs.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\de.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\es-419.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\VisualElements\Logo.png setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\VisualElements\LogoDev.png setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_en-GB.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_fr.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_id.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\zh-CN.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\MEIPreload\preloaded_data.pb setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\chrome.dll.sig setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdate.exe GoogleUpdate.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\133.0.6943.127\133.0.6943.127_chrome_installer.exe GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\chrome_100_percent.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\ar.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\Locales\en-US.pak setup.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe setup.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\CR_26634.tmp\setup.exe 133.0.6943.127_chrome_installer.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\elevated_tracing_service.exe setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_lt.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_zh-TW.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\default_apps\external_extensions.json setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\PrivacySandboxAttestationsPreloaded\manifest.json setup.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\chrome.VisualElementsManifest.xml setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdate.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_et.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_ms.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4608_1163545197\Chrome-bin\133.0.6943.127\VisualElements\SmallLogoDev.png setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_da.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_is.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_ur.dll GoogleUpdate.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\GUM632B.tmp\psuser_64.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\GoogleCrashHandler64.exe setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_fil.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_zh-CN.dll setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI348D.tmp msiexec.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_te.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_bg.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_cs.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_fi.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_sw.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_uk.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_vi.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_zh-TW.dll setup.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Installer\e58316b.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI3351.tmp msiexec.exe File created C:\Windows\SystemTemp\GUM632B.tmp\GoogleCrashHandler.exe setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_ur.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\GoogleUpdateBroker.exe setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_hu.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_is.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_kn.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_sk.dll setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\Installer\MSI31C9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI347D.tmp msiexec.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_am.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_fr.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_gu.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_id.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_iw.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_ja.dll setup.exe File opened for modification C:\Windows\Installer\MSI33EF.tmp msiexec.exe File created C:\Windows\SystemTemp\GUM632B.tmp\psuser.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_ca.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_lt.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_ml.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_tr.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\GoogleUpdateSetup.exe setup.exe File opened for modification C:\Windows\SystemTemp\chrome_installer.log setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\GoogleUpdate.exe setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_ar.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_da.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_et.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_pl.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_ro.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_sr.dll setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\Installer\MSI357A.tmp msiexec.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdate.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\psmachine_64.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\GoogleUpdateCore.exe setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File created C:\Windows\Installer\e58316b.msi msiexec.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_bn.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_es-419.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_ms.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_no.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_pt-BR.dll setup.exe File created C:\Windows\SystemTemp\GUM632B.tmp\goopdateres_sv.dll setup.exe File opened for modification C:\Windows\Installer\MSI349E.tmp msiexec.exe -
Executes dropped EXE 56 IoCs
pid Process 5044 aa.exe 3476 scrok.exe 4596 TjNkNpAilaYvt.exe 1424 TjNkNpAilaYvt.exe 4260 TjNkNpAilaYvt.exe 5520 TjNkNpAilaYvt.exe 4152 scrok.exe 5568 setup.exe 5528 setup.exe 1040 GoogleUpdate.exe 2328 svchost.exe 6124 svchost.exe 3384 svchost.exe 3984 GoogleUpdate.exe 4208 GoogleUpdate.exe 4176 GoogleUpdateComRegisterShell64.exe 1748 GoogleUpdateComRegisterShell64.exe 1680 GoogleUpdateComRegisterShell64.exe 2672 GoogleUpdate.exe 5544 GoogleUpdate.exe 3316 GoogleUpdate.exe 2244 133.0.6943.127_chrome_installer.exe 4608 setup.exe 5212 setup.exe 5768 setup.exe 4004 setup.exe 2952 GoogleCrashHandler.exe 2872 GoogleCrashHandler64.exe 1704 GoogleUpdateOnDemand.exe 5712 GoogleUpdate.exe 652 GoogleUpdate.exe 412 chrome.exe 3440 chrome.exe 5140 chrome.exe 5396 chrome.exe 1376 chrome.exe 5432 chrome.exe 748 chrome.exe 6108 chrome.exe 3984 elevation_service.exe 1624 chrome.exe 4052 chrome.exe 4332 chrome.exe 876 chrome.exe 5752 chrome.exe 4072 chrome.exe 5660 chrome.exe 3692 chrome.exe 5236 chrome.exe 4460 chrome.exe 5816 chrome.exe 2960 chrome.exe 2196 chrome.exe 344 chrome.exe 5436 chrome.exe 2860 chrome.exe -
Loads dropped DLL 64 IoCs
pid Process 5308 MsiExec.exe 5308 MsiExec.exe 5308 MsiExec.exe 5308 MsiExec.exe 5308 MsiExec.exe 5308 MsiExec.exe 5308 MsiExec.exe 1040 GoogleUpdate.exe 3984 GoogleUpdate.exe 4208 GoogleUpdate.exe 4176 GoogleUpdateComRegisterShell64.exe 4208 GoogleUpdate.exe 1748 GoogleUpdateComRegisterShell64.exe 4208 GoogleUpdate.exe 1680 GoogleUpdateComRegisterShell64.exe 4208 GoogleUpdate.exe 2672 GoogleUpdate.exe 5544 GoogleUpdate.exe 3316 GoogleUpdate.exe 3316 GoogleUpdate.exe 5544 GoogleUpdate.exe 5712 GoogleUpdate.exe 652 GoogleUpdate.exe 5712 GoogleUpdate.exe 412 chrome.exe 3440 chrome.exe 412 chrome.exe 5140 chrome.exe 5396 chrome.exe 5396 chrome.exe 1376 chrome.exe 1376 chrome.exe 5140 chrome.exe 5432 chrome.exe 5432 chrome.exe 5140 chrome.exe 5140 chrome.exe 5140 chrome.exe 6108 chrome.exe 5140 chrome.exe 5140 chrome.exe 5140 chrome.exe 6108 chrome.exe 1624 chrome.exe 4052 chrome.exe 1624 chrome.exe 4052 chrome.exe 4332 chrome.exe 4332 chrome.exe 876 chrome.exe 876 chrome.exe 5752 chrome.exe 5752 chrome.exe 4072 chrome.exe 4072 chrome.exe 5660 chrome.exe 5660 chrome.exe 3692 chrome.exe 3692 chrome.exe 5236 chrome.exe 5236 chrome.exe 4460 chrome.exe 4460 chrome.exe 5816 chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 4700 msiexec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleCrashHandler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdateOnDemand.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2672 GoogleUpdate.exe 652 GoogleUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000003fd43b55c343aeda0000000000000000000000000000000000000000000000000000000000000000000000000000000000001071020000000000c01200000000ffffffff0000000027010100008838013fd43b550000000000001071020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d083020000000000c050e1000000ffffffff000000000700010000e841013fd43b55000000000000d08302000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090d4e30000000000000005000000ffffffff00000000070001000048ea713fd43b5500000000000090d4e300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000003fd43b5500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2196 timeout.exe 2364 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\InstallTime = "2025-02-21 22:44" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133846515349491529" chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\ svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\Group = "Fatal" svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.Update3COMClassService.1.0\ = "Update3COMClass" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{534F5323-3569-4F42-919D-1E1CF93E5BF6}\AppID = "{9465B4B4-5216-4042-9A2C-754D3BCDC410}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B}\NumMethods\ = "5" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAB1D343-1B2A-47F9-B445-93DC50704BFE}\ = "ICoCreateAsync" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FE908CDD-22BB-472A-9870-1A0390E42F36} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CoreMachineClass\ = "Google Update Core Class" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34527502-D3DB-4205-A69B-789B27EE0414} GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{534F5323-3569-4F42-919D-1E1CF93E5BF6} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\ = "IProcessLauncher" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{084D78A8-B084-4E14-A629-A2C419B0E3D9}\ = "IApp2" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}\InProcServer32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B}\ = "IGoogleUpdate" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49D7563B-2DDB-4831-88C8-768A53833837}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CoreClass.1\ = "Google Update Core Class" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FE908CDD-22BB-472A-9870-1A0390E42F36}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{27634814-8E41-4C35-8577-980134A96544} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ABC01078-F197-4B0B-ADBC-CFE684B39C82}\ = "Google Update Process Launcher Class" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B3D28DBD-0DFA-40E4-8071-520767BADC7E}\LocalServer32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1C4CDEFF-756A-4804-9E77-3E8EB9361016}\VersionIndependentProgID\ = "GoogleUpdate.PolicyStatusSvc" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25461599-633D-42B1-84FB-7CD68D026E53}\VersionIndependentProgID\ = "GoogleUpdate.CredentialDialogMachine" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2E629606-312A-482F-9B12-2C4ABF6F0B6D} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\NumMethods\ = "8" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.Update3WebMachine.1.0\CLSID\ = "{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.PolicyStatusMachineFallback.1.0\CLSID\ = "{ADDF22CF-3E9B-4CD7-9139-8169EA6636E4}" GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\APPID\{9465B4B4-5216-4042-9A2C-754D3BCDC410} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{598FE0E5-E02D-465D-9A9D-37974A28FD42}\Elevation\IconReference = "@C:\\Program Files (x86)\\Google\\Update\\1.3.36.312\\goopdate.dll,-1004" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D05F64F-71E3-48A5-BF6B-83315BC8AE1F}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{247954F9-9EDC-4E68-8CC3-150C2B89EADF} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4DE778FE-F195-4EE3-9DAB-FE446C239221} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B} GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2}\NumMethods GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F8BD55B-E83D-4A47-85BE-81FFA8057A69}\LocalServer32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F8BD55B-E83D-4A47-85BE-81FFA8057A69}\Elevation\IconReference = "@C:\\Program Files (x86)\\Google\\Update\\1.3.36.312\\goopdate.dll,-1004" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DCAB8386-4F03-4DBD-A366-D90BC9F68DE6}\NumMethods\ = "10" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9D6AA569-9F30-41AD-885A-346685C74928}\InprocServer32\ThreadingModel = "Both" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13} GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FE908CDD-22BB-472A-9870-1A0390E42F36}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7DE94008-8AFD-4C70-9728-C6FBFFF6A73E}\VersionIndependentProgID GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3A47570-0A85-4AEA-8270-529D47899603}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1C642CED-CA3B-4013-A9DF-CA6CE5FF6503}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{909489C2-85A6-4322-AA56-D25278649D67} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CoreMachineClass\CLSID\ = "{9B2340A0-4068-43D6-B404-32E27217859D}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{463ABECF-410D-407F-8AF5-0DF35A005CC8}\TypeLib\Version = "1.0" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xht\OpenWithProgIds\ChromeHTML setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{9B2340A0-4068-43D6-B404-32E27217859D}\LOCALSERVER32 GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E225E692-4B47-4777-9BED-4FD7FE257F0E}\ProgID GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\ = "IPolicyStatus2" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\NumMethods GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{909489C2-85A6-4322-AA56-D25278649D67}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{909489C2-85A6-4322-AA56-D25278649D67}\NumMethods\ = "4" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9465B4B4-5216-4042-9A2C-754D3BCDC410}\VersionIndependentProgID\ = "GoogleUpdate.OnDemandCOMClassSvc" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{19692F10-ADD2-4EFF-BE54-E61C62E40D13}\NumMethods\ = "4" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\NumMethods GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3A47570-0A85-4AEA-8270-529D47899603}\NumMethods\ = "4" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1C642CED-CA3B-4013-A9DF-CA6CE5FF6503}\ = "IProgressWndEvents" GoogleUpdateComRegisterShell64.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 4768 msiexec.exe 4768 msiexec.exe 3476 scrok.exe 3476 scrok.exe 3476 scrok.exe 3476 scrok.exe 5520 TjNkNpAilaYvt.exe 4152 scrok.exe 4152 scrok.exe 5568 setup.exe 5568 setup.exe 4152 scrok.exe 4152 scrok.exe 1040 GoogleUpdate.exe 1040 GoogleUpdate.exe 1040 GoogleUpdate.exe 1040 GoogleUpdate.exe 1040 GoogleUpdate.exe 1040 GoogleUpdate.exe 5544 GoogleUpdate.exe 5544 GoogleUpdate.exe 652 GoogleUpdate.exe 652 GoogleUpdate.exe 1040 GoogleUpdate.exe 1040 GoogleUpdate.exe 1040 GoogleUpdate.exe 1040 GoogleUpdate.exe 412 chrome.exe 412 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4700 msiexec.exe Token: SeIncreaseQuotaPrivilege 4700 msiexec.exe Token: SeSecurityPrivilege 4768 msiexec.exe Token: SeCreateTokenPrivilege 4700 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4700 msiexec.exe Token: SeLockMemoryPrivilege 4700 msiexec.exe Token: SeIncreaseQuotaPrivilege 4700 msiexec.exe Token: SeMachineAccountPrivilege 4700 msiexec.exe Token: SeTcbPrivilege 4700 msiexec.exe Token: SeSecurityPrivilege 4700 msiexec.exe Token: SeTakeOwnershipPrivilege 4700 msiexec.exe Token: SeLoadDriverPrivilege 4700 msiexec.exe Token: SeSystemProfilePrivilege 4700 msiexec.exe Token: SeSystemtimePrivilege 4700 msiexec.exe Token: SeProfSingleProcessPrivilege 4700 msiexec.exe Token: SeIncBasePriorityPrivilege 4700 msiexec.exe Token: SeCreatePagefilePrivilege 4700 msiexec.exe Token: SeCreatePermanentPrivilege 4700 msiexec.exe Token: SeBackupPrivilege 4700 msiexec.exe Token: SeRestorePrivilege 4700 msiexec.exe Token: SeShutdownPrivilege 4700 msiexec.exe Token: SeDebugPrivilege 4700 msiexec.exe Token: SeAuditPrivilege 4700 msiexec.exe Token: SeSystemEnvironmentPrivilege 4700 msiexec.exe Token: SeChangeNotifyPrivilege 4700 msiexec.exe Token: SeRemoteShutdownPrivilege 4700 msiexec.exe Token: SeUndockPrivilege 4700 msiexec.exe Token: SeSyncAgentPrivilege 4700 msiexec.exe Token: SeEnableDelegationPrivilege 4700 msiexec.exe Token: SeManageVolumePrivilege 4700 msiexec.exe Token: SeImpersonatePrivilege 4700 msiexec.exe Token: SeCreateGlobalPrivilege 4700 msiexec.exe Token: SeBackupPrivilege 4672 vssvc.exe Token: SeRestorePrivilege 4672 vssvc.exe Token: SeAuditPrivilege 4672 vssvc.exe Token: SeBackupPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeRestorePrivilege 4768 msiexec.exe Token: SeTakeOwnershipPrivilege 4768 msiexec.exe Token: SeDebugPrivilege 3476 scrok.exe Token: SeDebugPrivilege 4596 TjNkNpAilaYvt.exe Token: SeDebugPrivilege 1424 TjNkNpAilaYvt.exe Token: SeBackupPrivilege 2452 srtasks.exe Token: SeRestorePrivilege 2452 srtasks.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4700 msiexec.exe 4700 msiexec.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5568 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4768 wrote to memory of 2452 4768 msiexec.exe 88 PID 4768 wrote to memory of 2452 4768 msiexec.exe 88 PID 4768 wrote to memory of 5308 4768 msiexec.exe 90 PID 4768 wrote to memory of 5308 4768 msiexec.exe 90 PID 4768 wrote to memory of 5308 4768 msiexec.exe 90 PID 5308 wrote to memory of 4304 5308 MsiExec.exe 91 PID 5308 wrote to memory of 4304 5308 MsiExec.exe 91 PID 5308 wrote to memory of 4304 5308 MsiExec.exe 91 PID 4304 wrote to memory of 2196 4304 cmd.exe 93 PID 4304 wrote to memory of 2196 4304 cmd.exe 93 PID 4304 wrote to memory of 2196 4304 cmd.exe 93 PID 4304 wrote to memory of 5044 4304 cmd.exe 94 PID 4304 wrote to memory of 5044 4304 cmd.exe 94 PID 4304 wrote to memory of 5044 4304 cmd.exe 94 PID 4304 wrote to memory of 3476 4304 cmd.exe 95 PID 4304 wrote to memory of 3476 4304 cmd.exe 95 PID 3476 wrote to memory of 812 3476 scrok.exe 10 PID 3476 wrote to memory of 812 3476 scrok.exe 10 PID 3476 wrote to memory of 812 3476 scrok.exe 10 PID 4304 wrote to memory of 4596 4304 cmd.exe 96 PID 4304 wrote to memory of 4596 4304 cmd.exe 96 PID 4304 wrote to memory of 1424 4304 cmd.exe 97 PID 4304 wrote to memory of 1424 4304 cmd.exe 97 PID 4304 wrote to memory of 2364 4304 cmd.exe 98 PID 4304 wrote to memory of 2364 4304 cmd.exe 98 PID 4304 wrote to memory of 2364 4304 cmd.exe 98 PID 4304 wrote to memory of 4260 4304 cmd.exe 99 PID 4304 wrote to memory of 4260 4304 cmd.exe 99 PID 4304 wrote to memory of 4152 4304 cmd.exe 101 PID 4304 wrote to memory of 4152 4304 cmd.exe 101 PID 5520 wrote to memory of 5568 5520 TjNkNpAilaYvt.exe 102 PID 5520 wrote to memory of 5568 5520 TjNkNpAilaYvt.exe 102 PID 5520 wrote to memory of 5568 5520 TjNkNpAilaYvt.exe 102 PID 4152 wrote to memory of 812 4152 scrok.exe 10 PID 4152 wrote to memory of 812 4152 scrok.exe 10 PID 4152 wrote to memory of 812 4152 scrok.exe 10 PID 4304 wrote to memory of 5528 4304 cmd.exe 103 PID 4304 wrote to memory of 5528 4304 cmd.exe 103 PID 4304 wrote to memory of 5528 4304 cmd.exe 103 PID 5528 wrote to memory of 1040 5528 setup.exe 104 PID 5528 wrote to memory of 1040 5528 setup.exe 104 PID 5528 wrote to memory of 1040 5528 setup.exe 104 PID 5568 wrote to memory of 2328 5568 setup.exe 105 PID 5568 wrote to memory of 2328 5568 setup.exe 105 PID 5568 wrote to memory of 2328 5568 setup.exe 105 PID 5568 wrote to memory of 6124 5568 setup.exe 106 PID 5568 wrote to memory of 6124 5568 setup.exe 106 PID 5568 wrote to memory of 6124 5568 setup.exe 106 PID 5568 wrote to memory of 3384 5568 setup.exe 107 PID 5568 wrote to memory of 3384 5568 setup.exe 107 PID 5568 wrote to memory of 3384 5568 setup.exe 107 PID 1040 wrote to memory of 3984 1040 GoogleUpdate.exe 108 PID 1040 wrote to memory of 3984 1040 GoogleUpdate.exe 108 PID 1040 wrote to memory of 3984 1040 GoogleUpdate.exe 108 PID 1040 wrote to memory of 4208 1040 GoogleUpdate.exe 109 PID 1040 wrote to memory of 4208 1040 GoogleUpdate.exe 109 PID 1040 wrote to memory of 4208 1040 GoogleUpdate.exe 109 PID 4208 wrote to memory of 4176 4208 GoogleUpdate.exe 110 PID 4208 wrote to memory of 4176 4208 GoogleUpdate.exe 110 PID 4208 wrote to memory of 1748 4208 GoogleUpdate.exe 111 PID 4208 wrote to memory of 1748 4208 GoogleUpdate.exe 111 PID 4208 wrote to memory of 1680 4208 GoogleUpdate.exe 112 PID 4208 wrote to memory of 1680 4208 GoogleUpdate.exe 112 PID 1040 wrote to memory of 2672 1040 GoogleUpdate.exe 113 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:812
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe" -Embedding2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ondemand3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5712 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer4⤵
- Checks computer location settings
- Checks system information in the registry
- Drops file in Windows directory
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.127 --initial-client-data=0x1f8,0x220,0x224,0x21c,0x228,0x7ffc6300fff8,0x7ffc63010004,0x7ffc630100105⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1944,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1696 /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1588,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2240 /prefetch:35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2392,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2572 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3020,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3040 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3000,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3012 /prefetch:15⤵
- Executes dropped EXE
PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3720,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3732 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3780,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3868 /prefetch:25⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:6108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4448,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4492 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4836,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4788 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5012,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5008 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5156,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5548 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5604,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5628 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5620,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5684 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5956,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5968 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6196,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6096 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5540,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5552 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6076,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4788 /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5572,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6172 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=6360,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5568 /prefetch:25⤵
- Checks computer location settings
- Executes dropped EXE
PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6336,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6052 /prefetch:85⤵
- Executes dropped EXE
PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5780,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4888 /prefetch:85⤵
- Executes dropped EXE
PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6168,i,14237436478547720902,18268883264160138900,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6416 /prefetch:85⤵
- Executes dropped EXE
PID:5436
-
-
-
-
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Chrome.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4700
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding BA519B25DEF5262FF0A6FC21B983B06B2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c timeout /nobreak /t 7 & C:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData & C:\ProgramData\Packas\scrok.exe & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & timeout /nobreak /t 2 & C:\ProgramData\Smart\TjNkNpAilaYvt.exe start & C:\ProgramData\Packas\scrok.exe & del C:\ProgramData\Packas\scrok.exe & C:\ProgramData\setup\setup.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 74⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2196
-
-
C:\ProgramData\setup\aa.exeC:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5044
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3476
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2364
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe start4⤵
- Executes dropped EXE
PID:4260
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4152
-
-
C:\ProgramData\setup\setup.exeC:\ProgramData\setup\setup.exe4⤵
- Drops file in Windows directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5528 -
C:\Windows\SystemTemp\GUM632B.tmp\GoogleUpdate.exeC:\Windows\SystemTemp\GUM632B.tmp\GoogleUpdate.exe /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={9F0C1F44-1C50-396A-483A-08DA4896FF0B}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"5⤵
- Event Triggered Execution: Image File Execution Options Injection
- Checks computer location settings
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3984
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4176
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1748
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1680
-
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSIxMDE1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2672
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={9F0C1F44-1C50-396A-483A-08DA4896FF0B}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{85D107B0-5A3D-4B9D-BD97-0F19B6124813}"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5544
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exe"C:\ProgramData\Smart\TjNkNpAilaYvt.exe"1⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5520 -
C:\ProgramData\Smart\setup.exe"C:\ProgramData\Smart\setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5568 -
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:6124
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3384
-
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc1⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3316 -
C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\133.0.6943.127_chrome_installer.exe"C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\133.0.6943.127_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\guiDE3.tmp"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:2244 -
C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\CR_26634.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\CR_26634.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\CR_26634.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\guiDE3.tmp"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Program Files directory
- Drops file in Windows directory
- Executes dropped EXE
- Modifies registry class
PID:4608 -
C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\CR_26634.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\CR_26634.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.127 --initial-client-data=0x294,0x298,0x29c,0x254,0x2a0,0x7ff64d71bed8,0x7ff64d71bee4,0x7ff64d71bef04⤵
- Drops file in Windows directory
- Executes dropped EXE
PID:5212
-
-
C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\CR_26634.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\CR_26634.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Drops file in Windows directory
- Executes dropped EXE
PID:5768 -
C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\CR_26634.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{FF326FF5-CF4E-44DA-B8B3-D14B0ED8ADDB}\CR_26634.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.127 --initial-client-data=0x294,0x298,0x29c,0x270,0x2a0,0x7ff64d71bed8,0x7ff64d71bee4,0x7ff64d71bef05⤵
- Drops file in Windows directory
- Executes dropped EXE
PID:4004
-
-
-
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe"2⤵
- Executes dropped EXE
PID:2872
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgZG93bmxvYWRlcj0iYml0cyIgdXJsPSJodHRwOi8vZWRnZWRsLm1lLmd2dDEuY29tL2VkZ2VkbC9yZWxlYXNlMi9jaHJvbWUvYXUybjMyaDNobmNuYzVrY241Mnd4YXh6eGFfMTMzLjAuNjk0My4xMjcvMTMzLjAuNjk0My4xMjdfY2hyb21lX2luc3RhbGxlci5leGUiIGRvd25sb2FkZWQ9IjExODkyOTI2NCIgdG90YWw9IjExODkyOTI2NCIgZG93bmxvYWRfdGltZV9tcz0iMzQwNjIiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iNiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5NjcwNyIgc291cmNlX3VybF9pbmRleD0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjUzMSIgZG93bmxvYWRfdGltZV9tcz0iMzUxMjUiIGRvd25sb2FkZWQ9IjExODkyOTI2NCIgdG90YWw9IjExODkyOTI2NCIgaW5zdGFsbF90aW1lX21zPSIyOTI1MCIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.127\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.127\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58964eda45537c489f9a837f200a1649f
SHA18864527c298c26ec8a34c500fce21248d6a5a8b5
SHA256cf27604431a4237a26d6c466730130843900a055ce5931ce9ebcdf12b1db7faa
SHA5120860ecad332b7c685388ad1df675704edf3eda666606b40a4efdfc0bdf2e229e01d05082f1065c0d2b8941dcf2903152f30e88063af16ee5eb1051ccaa36dbe0
-
Filesize
3.3MB
MD54ce1a842d3d770f6fa4b4167542408b2
SHA143b0c03b176318ce2551d3dfc2c18e18f53c2240
SHA256ba51980ef9681d849c9331e891cc411c1687d3c011f0acc01da9f4ef640764b6
SHA512a28f0659af75da93f479359212dc4ffb9440f171cf89b19de929b7a8015b5e087ea53ab979dd6815597865538c79b1e3354e987940da88da4dfcf16bdf1f4337
-
Filesize
2.7MB
MD5a03b2eaa4d517fd935bb0032d444f22d
SHA1014864aac638b7c04b4d50e6c39d7266eafda773
SHA2566fd145b1de7d0a143fd25274544d5e3c4ecee06cf3e31631d51cae8ca3e25f01
SHA51268a253fcdb3cd1a086fe93fa7c8a7500d6b5414bdfc0dad555973697d4fb552e09088b849573f705ca91b1652ddd4572842b82d40f5821761b3ac299e465be51
-
Filesize
832KB
MD5d305d506c0095df8af223ac7d91ca327
SHA1679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a
SHA256923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66
SHA51294d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796
-
Filesize
935B
MD51736ab4c3ffe08db1ef536ec66a37294
SHA10cfbfc6b811e8dc6831b80da6294f3e3be2b9c44
SHA25639f2428082c70584ed9764050d0a70355f6c5c07f8cec265fdd8bb6272d57e23
SHA51233db11aded3f66b56dffa25876e20183470fa09f63e21e652bc92c39d047dd53d2efd07b5bf0923dd7728f7ecc41ea1c387294e3b7d08f7b8c49b4c8e5b6a9e4
-
Filesize
1009B
MD52e7e3c2ce33bc262d63a21c442ed153b
SHA11358a12a65ab2983ce49197e2985371a24e4f4ce
SHA2560ed90361f83ca4da1dfe086c114c0b5716f9bc409f4de79c2295ea9304ce5998
SHA5124188e6b57324f6dcf1d3eed0f55ac4f3189c0a2b4ff8d91c36dc6ad2a2f7ee09e8a8c08838ec8f290c1d5f2d315d9f95328e5413d8dbf0acde372330e9526060
-
Filesize
613B
MD542082fbeb56beaab1e78c49958ecccdc
SHA1afe3be87081e9187b5c37e984dc81e50358c8b51
SHA25690c15b61a6cb510f46746c48b108beb8031feb8888c13452ea1281fffbda942b
SHA5129a94bb61a711a3723a8487f3ac7c3afc74c2e1bcb58cd6b3a03f68ec80835c889fb311b050177e89c6064ca2a0d8ab05b2d911764610a511021f0d072741f189
-
Filesize
769B
MD52241347a9020bc93af4e8d96d3bbc834
SHA1545cbfe63420620d58e9a08173f8c68c7a1521bf
SHA256557d68c6bd85a24f1718f50fafc99d4978c5c4679dd26280288223ea6a5e72fc
SHA5122309ea1b5d00d9ea90b2e721a42260709e2b67cad24ca5fab3a69a54363ca87b2bbd80f31925cbf95b21b941dbc5d3edee2456baf5d26a771abda8270b1fe9a7
-
Filesize
298B
MD52c706293a3cfff8cc184a8e9a3b3da08
SHA1873d7c9f51aa6cebd4ad3ae5930d1de84bb4437d
SHA256ed28baf8be3a588d50ed246c2cd741bbd498aee74ea0675d57e0b33236e22067
SHA5124aba3e25507ba5c29219ff51553f3616d07aeeb30f7465f9e921eea94cdcb411d1f48d1eefed647c22405df275e7f9d7506aac52202aae137391c6831463b043
-
Filesize
4.7MB
MD5118a9a9f6280e177fdac16989b8aa1a5
SHA1fc37316439372be17a982d02cd0d294f7aaca751
SHA256b995e6a0299f2465fd5881157aab1c6c9753c8e459efd661b9cd1e83be7e53f6
SHA51214c731e7f7e9736f39d6c79a98bf1a3264da9dc76bab4faca82ec64f276f3d39c9bc4638991e30a06f52bf6204619f5da8c3168d11afe058e0c1d21a89d42878
-
Filesize
1.0MB
MD509c448be7e7d84e6e544cc03afbb05d8
SHA1ddc13e71a72bc49c60f89b98cbb79c2449cfa07e
SHA256a0f127a70943b0262060498c1723c795a8e2980f1acf0c42ee8c1dae72ae54b5
SHA512e5f7a988a999e7e34d0aa2d2a5b2fbb22689588d3def4bed4518ceed38710e3714c5614bab192b0ce6bcac5172a87ebf3b3b923e495eb7344c70bd11f4bf1c12
-
Filesize
10.8MB
MD59bd359e3956d119811c3a6abef58e644
SHA19f221781f406ebcb15fc2c02d5d259116155c734
SHA256ead38673817c84de77a4d2fe6118e6a96f863e3db38f73518007caa2af676146
SHA5127f817794728e532da07424c621eeef161501644d137068895391505d7110f1f8ee9dc76944946e3960f84e462c66fd82ee61b619ca91a07166aed5d3434f618b
-
Filesize
1.3MB
MD54a94844260d6a08828d781d488cef61d
SHA1de8169fdb5ab8a120df577d92eb25a2767431738
SHA25646d7a8abe3bb9d7302529246cd8ee6e7d0360d1045fe92662cc7580e72ef5132
SHA51282549c1e525a90003fb0174ebba2bc3b4f58706ef9fd5e6ee07d489ab536ef286e408db6c15a52b039d3f59c09bd55e35d045def79007da5d414d5d589d34f4f
-
Filesize
414B
MD5c92e8e6045f009c8b0b72a4591daef3e
SHA157ccf283ae0c4ffe09b9f9c54372d0e3f39c01eb
SHA2564dcefaf3f50dec532bfd3fc207f3e5e0bb4cad4dd05347cd92c7c9843646c73d
SHA51291f7bade5da947a63e65464e5f08416776d9948807fee4e407822cefdec244e622da110045a7630a0fde93a761d2dbd4ae555f60bb585c2861e7f1b130673cd6
-
Filesize
96B
MD57249b03f3c5d0933cb4af31a9548b5bb
SHA17c2b1177b3f623bbd4609620417cc4b6428afe6c
SHA256d8f949052f71149454663d2369bc85418c0e8a114d071fd6a30ba04cf60e547b
SHA51243ddc5e7e5df386cdd2ebea7f31d8e4e91aaef454663c090281a2b40b1eef6d4fab3ce80f1fd3db57b8bd0c7f75596c28d8badaf17cf7957d0faf99f8a9533e7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\en\messages.json
Filesize593B
MD591f5bc87fd478a007ec68c4e8adf11ac
SHA1d07dd49e4ef3b36dad7d038b7e999ae850c5bef6
SHA25692f1246c21dd5fd7266ebfd65798c61e403d01a816cc3cf780db5c8aa2e3d9c9
SHA512fdc2a29b04e67ddbbd8fb6e8d2443e46badcb2b2fb3a850bbd6198cdccc32ee0bd8a9769d929feefe84d1015145e6664ab5fea114df5a864cf963bf98a65ffd9
-
Filesize
192KB
MD5505a174e740b3c0e7065c45a78b5cf42
SHA138911944f14a8b5717245c8e6bd1d48e58c7df12
SHA256024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d
SHA5127891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD5681dde4b157ea6ba6e8024a438ace5e9
SHA19d874232203b1dff95e766926d794885cff7f30f
SHA256c49270a94d31e1b17dca9340b03a9208dd2bd5d80a7cb31ddd563d27aac18359
SHA51296396d03c3469bced2350d8cc325088f0c399504da3fd631331bc50ada5ef0a4e6d68e9c8243f076ed0dd770b71672647a3a542c0201778e234b2b501bb3d487
-
Filesize
12KB
MD597760d5ee2008093c145293c50761df9
SHA1dace0cc151bc55f53e3b574e394a5735e386a3de
SHA2565711cc65b82a6dd51cbad6e46e3c4b9be8ca31fbfeeec6c14b93efa4a8f74701
SHA5125c817bbd5ac898ff1d8e3367c776030f2c702534986ec255f583fa7e710146b7997f38848e1f6dcfc40af4ff1de810a707acd330c80f3a8b0b7e82392bb62179
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5836f1e0a6232b656d52711a402c66bec
SHA1a5d892a275c2d1f03c18971521d49ec9345889ce
SHA256bed783144100d68d95e3cbc64593b7495cc4ef7329be3a9d7f2bf4a7117373a3
SHA512a157fb57cdec38be3256f4d029c1fed863f594777e06e54733548e48806b29e74697951d4da17b3c3c04079f7865de531fe876deba1a09619ab173455eff77a4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir\the-real-index
Filesize48B
MD51fb47e693ffd918eba824d3ef2d8cd16
SHA1eac7ab1faaf5dcae2ee944947ccc52b0c9d1708c
SHA256114d2a3030c8f0094c131f527e6d3e42383dd38c1bcb761610a8ce6927bbb57b
SHA512b7643cb7c158e1bfe4c7d4ef167f8ebf0df4c7b3223a27f7b4162082386cb959b8aaad41b585d4c3eefbecdc548b0b7acc60bbac2ccfeebbf4163dda874ae840
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_1
Filesize264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\data_3
Filesize8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnGraphiteCache\index
Filesize256KB
MD56a00c541b74a1b6fa4ffe262f80d9968
SHA1282f246380aa9cffba47e5ac76426115f923675f
SHA25617abd7f68a139804ad498c47ce39eb3a85bf98d3fb5b9f7c730c69b881d51363
SHA512b6ce45295fb72881005477a444c85104f20ea4f22f9040defd8e576b2f645a926a7984d0779397eb5ecaf78c892a61411e8d5ee54fc426fc934681b1c6f15013
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session Storage\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
38B
MD5b77fc97eecd8f7383464171a4edef544
SHA1bbae26d2a7914a3c95dca35f1f6f820d851f6368
SHA25693332c49fab1deb87dac6cb5d313900cb20e6e1ba928af128a1d549a44256f68
SHA51268745413a681fdf4088bf8d6b20e843396ae2e92fbb97239dc6c764233a7e7b700a51548ff4d2ea86420b208b92a5e5420f08231637fbb5dbf7e12a377be3fc3
-
Filesize
122KB
MD5164c74963190ffd67fde601db7ac7cd9
SHA108a44ee8f17b199711ba0090b6c43e5b632a4d07
SHA256bddd93ba5d2c9d6e1c96b590d58d554fc3ad34d0b7845afa1af3127a2beeb1e0
SHA512a39330257e6291543a6ef61b284898c9f1e273747fa59738338610c514bf360a4cf2f247c42fb231234fcc0558a5bf5f301b67d89a3e4e5f0906c38d621a91ca
-
Filesize
195KB
MD574fea16825acfcb6624492f335fb497b
SHA15db30ca233704ad27f28ffc42748e54fb4e0d859
SHA256074798fe56a735ad32b63ef4183ecfd9344fb4c93293b3b3550f57f1043e6dbb
SHA5126529320a6782f25725cd3182efe6da8a42627dba25d07e771bf6df5934c4f259f74456bcf7d6fce3ecfccdeb5450ffff445514d857c7e1c42ddb4899d28edfa5
-
Filesize
195KB
MD546d080397898a40ed0f5f801f227a479
SHA1cc09c718e930f99f9b28382a2748d578dd0b2d63
SHA256b69fc4d776d3e3adaab00a2d921438d28b014fc5dd75071428f33fa84cf4f43f
SHA512cdb2fa23596e8c107cc5ec45d2a1b5a6c40dac1e3838fb7fd8d88f38ed4b286080f8ffd2f526f2b89795380c8db4eb948710c17b14b8e0d80abb509433749101
-
Filesize
1KB
MD5065ba7ab4a148dd96ec21e112d3f71db
SHA118e9ca2d097e6f1e3b0b944e8d32b321bcde667d
SHA2566a36e0ff68fc9afc92361191bedcde371ed1a05a9e8e19290583a890493f7b62
SHA512049d43d80cb6806aef2f3828c6505660d53d05e5fb338f00f830a231da836b3ea493994b78d4ed4d7b7939cf4cc27ca927c765c2372e9b385caf64f4a906c720
-
Filesize
450B
MD5dbedf86fa9afb3a23dbb126674f166d2
SHA15628affbcf6f897b9d7fd9c17deb9aa75036f1cc
SHA256c0945dd5fdecab40c45361bec068d1996e6ae01196dce524266d740808f753fe
SHA512931d7ba6da84d4bb073815540f35126f2f035a71bfe460f3ccaed25ad7c1b1792ab36cd7207b99fddf5eaf8872250b54a8958cf5827608f0640e8aafe11e0071
-
Filesize
587KB
MD5c7fbd5ee98e32a77edf1156db3fca622
SHA13e534fc55882e9fb940c9ae81e6f8a92a07125a0
SHA256e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6
SHA5128691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a
-
Filesize
1.1MB
MD5ae463676775a1dd0b7a28ddb265b4065
SHA1dff64c17885c7628b22631a2cdc9da83e417d348
SHA25683fbfcaff3da3eb89f9aec29e6574cf15502fd670cbb2ab0c8a84451b2598b22
SHA512e47c2db249e7a08c5d2864671fbc235e48aebecbe0b2c2334d1a4cba1b5b3037522ff89408589f3559b3a1eaf507bd338645387d55800029bb3b941d4c7744d6
-
Filesize
294KB
MD5a11ce10ac47f5f83b9bc980567331a1b
SHA163ee42e347b0328f8d71a3aa4dde4c6dc46da726
SHA256101dbf984c4b3876defe2699d6160acbf1bb3f213e02a32f08fdcdc06821c542
SHA512ff2f86c4061188ead1bfeebd36de7dbc312adcc95267537697f2bfcbb0c53e7c4ab0cd268cef22f0182391796c4612c97cbdc1266d9ee1960cdd2610d8c2bcb3
-
Filesize
392KB
MD5b659663611a4c2216dff5ab1b60dd089
SHA19a14392a5bdb9ea6b8c3e60224b7ff37091d48b5
SHA256cad4aa1cf58f6b2e2aceb789d53b18418e67066ec406b2fac786cb845ef89d2b
SHA5121065f9072cd6f1f4364f1354108f2647ee1d89f87e908a22fcd63bd3149c864c457e62268067a439d0486d8d4aa150aa984ad8ac8b51cae49014b67b80496040
-
Filesize
158KB
MD5cdf152e23a8cbf68dbe3f419701244fc
SHA1cb850d3675da418131d90ab01320e4e8842228d7
SHA25684eaf43f33d95da9ab310fc36dc3cfe53823d2220946f021f18cf3f729b8d64e
SHA512863e1da5bc779fa02cf08587c4de5f04c56e02902c5c4f92a06f2e631380ecabcc98e35d52609f764727e41b965c0786d24ea23fc4b9776d24d9f13e0d8ae0c2
-
Filesize
181KB
MD5be535d8b68dd064442f73211466e5987
SHA1aa49313d9513fd9c2d2b25da09ea24d09cc03435
SHA256c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59
SHA512eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638
-
Filesize
217KB
MD5af51ea4d9828e21f72e935b0deae50f2
SHA1c7fe57c2a16c9f5a5ebdd3cc0910427cba5308bd
SHA2563575011873d0f6d49c783095dae06e6619f8f5463da578fbe284ca5d1d449619
SHA512ec9828d0bade39754748fb53cfc7efdc5e57955198bac3c248ea9b5a9a607182bb1477819f220549a8e9eadbe6bf69a12da6c8af3761980d2dd9078eaeaa932f
-
Filesize
1.9MB
MD5dae72b4b8bcf62780d63b9cbb5b36b35
SHA11d9b764661cfe4ee0f0388ff75fd0f6866a9cd89
SHA256b0ca6700e7a4ea667d91bcf3338699f28649c2e0a3c0d8b4f2d146ab7c843ab6
SHA512402c00cab6dac8981e200b6b8b4263038d76afe47c473d5f2abf0406222b32fff727b495c6b754d207af2778288203ce0774a6200b3e580e90299d08ce0c098f
-
Filesize
42KB
MD5849bc7e364e30f8ee4c157f50d5b695e
SHA1b52b8efa1f3a2c84f436f328decd2912efeb1b18
SHA256f1384a25a6f40e861455c62190d794415f3e9bfca6317c214847e9535dfc3fb9
SHA5126fd7f542a7073b3bbf1b0c200bb306b30f1b35a64a1fb013f25c7df76f63ef377d9bd736e8da2e9372f1c994785eaeedb6b60e3a0d4a4e8734c266ad61782d3b
-
Filesize
41KB
MD5163695df53cea0728f9f58a46a08e102
SHA171b39eec83260e2ccc299fac165414acb46958bd
SHA256f89dddda3e887385b42ea88118ba8fb1cc68fde0c07d44b851164564eb7c1ec8
SHA5126dfb70a175097f3c96ae815a563c185136cb5a35f361288cc81570facfa1f1d28f49eaa61172d1da4982ebb76bd3e32c4de77cf97dedfb79f18113d7594d0989
-
Filesize
44KB
MD5c523ec13643d74b187b26b410d39569b
SHA146aff0297036c60f22ad30d4e58f429890d9e09d
SHA25680505863866bcd93a7e617dd8160531401d6d05f48d595348cd321cf7d97aeac
SHA512ecf98e29a3481b05ab23c3ff89fa3caf054b874ed15462a5e33022aacf561d8fea4a0de35cc5f7450f62110ca4ace613e0c67f543ad22eb417e79eb3ebf24ed7
-
Filesize
44KB
MD5dafa45a82ce30cf2fd621e0a0b8c031f
SHA1e39ed5213f9bb02d9da2c889425fab8ca6978db7
SHA256d58e5f0fa894123de1d9b687a5b84826e095eca128ee5df8870f2db74f4233a2
SHA5122b772ebc128eb59d636eec36583329962ead8e0a399fd56394b1244486bf815f4e033ceef74a62a9930ab2bf6ec1ba5e2d3c942183f7cb2355a716a3e2c6c7a1
-
Filesize
44KB
MD539e25ba8d69f493e6f18c4ef0cf96de8
SHA15584a94a85d83514a46030c4165e8f7a942e63e2
SHA2561f66ebdcaae482a201a6e0fab9c1f4501c23a0d4ad819ccd555fdca9cc7edb94
SHA512773c995b449d64e36eb8cab174db29e29e29985bcfd714799d6b05b01bb7d4a0fc2aefaf2e27ff02b0e105fbe0d34d7efe29b193a1bc3365ec47e1f1003bed26
-
Filesize
43KB
MD5b9033db8d0e5bf254979b0f47d10e93d
SHA12859de0d851b5f4fd3056e8f9015cece2436c307
SHA25612c41c2f472b6a05fd6392e9d4f8aeb9a40840c2cbefd68b39d20f9d1d4d77ed
SHA51252075df4ae5c86ebb0bac20604ea072a163761ae058c1473211bf4bb0eeed043cfc5a92386f876b53484cdf4e3f8a7b75d8f4bf9894c24f8c22ec23a50b70b7c
-
Filesize
43KB
MD59f2e018a4f9a1d278983d0b677b91218
SHA1c58ee1fc0d8ef9d99f85426b48c7f28f381a2c17
SHA256d0dcdc68236eecd6b5f0b437eb92b8935741dabf1fa276a552399815af22edec
SHA51220b74b6a9f81527d4a5fe30671d2559261fb682576f4ab04da7856280fbbaeb6af83894009c9d7cb83deeae988d0ac5ec7ec32b277b7eb45829faec2857d7014
-
Filesize
45KB
MD596d92500b9a763f4b862c511c17e0a47
SHA12fd441eb8685d15e14fa6405e82359adea3e7148
SHA25658829d135ff41e574ed5fc5e0421e4aa204267b02ca3ffaf08d8efb0a70fdd4c
SHA512a1014584f1f278160d579848fa188f627676aee819e9395517490b00e273db6f583d7ddd31af6e35c9d251021df7fb26c88512aaa1c865c2ee3ba60c0a2db49a
-
Filesize
44KB
MD5ecdd26049573614b6f41d8a102ffcf21
SHA15140c6cff5d596267a64df1559ac36c4e8f49e42
SHA256a3377520f2a95b8cc06bd30e493962c07f97eebf4661a69d03efb36b2ca515c5
SHA512933c181d7575f20480c8deadac3f3e9190081456169122216c72e7b9a04aa75612140fc37697098c7c20b77001a67966fa1661cdc9110c40634c944f833a65b1
-
Filesize
42KB
MD5f82ccf890c3ae14bfd7a263d07276e60
SHA16a915d6eb8c99d065e36a721d721d556b74bb377
SHA2566b07a4fd3039541e30c68a8c31c371cda2cea480787f95e0ddbca3cc2fbff0cc
SHA5124cbf9e6728e08de8d61f34b17bb20d92b6a699969edb9afa013fe962c8fd39238288adcd826134c9bca459904d8574a804c519daac6b301e0d38f68722c0359e
-
Filesize
42KB
MD5741211652c66a8a6790396e1875eefa9
SHA12ccd5653b5fc78bcc19f86b493cef11844ba7a0c
SHA256e0945deacdb6b75ff2587dea975774b9b800747e2ee3f3917e5b40ddb87eda10
SHA512b70f847d8ca8828c89bbb67b543950fbd514c733cf62b52ad7fc0dab7b2168fe56d1f21bef3210f5c7f563f72831455d870a5f9aa6c557f1e3543ef7329c42f9
-
Filesize
45KB
MD5dae64d49ee97339b7327b52c9f720848
SHA115f159c4808f9e4fe6a2f1a4a19faa5d84ac630b
SHA256e76400e62ae0ab31565e50b05d1001b775a91aa487a54dc90e53c0e103c717c2
SHA5129ae72e5a658aa0e1fb261d62ccef474cd42d9bec2b4a50f71925d131ffea22b8f60fb961772587ce71cb30a32da3b7986e7483ecea960a509e0450d3983c84b0
-
Filesize
37KB
MD5ca52cc49599bb6bda28c38aea1f9ec4e
SHA1494f166b530444f39bca27e2b9e10f27e34fc98a
SHA256f9f144aa2dc0de21b24c93f498a9b4a946b7da42819a776b3283a0bcae18544b
SHA51205e2d5711eef8f57737b2512de2e73744f17e0a34de0bfd2a06c9cc60a08ebadbafe38e30b66a2ede7fa61d5b9571adddcfbd7e1cafcee1ab2168a563d2d3f0d
-
Filesize
24.0MB
MD55cc7864a3aa7b01dcfe98969632636fe
SHA135c8cc22fd38ebc0e30b4d4f3ef3102af175ca30
SHA25649a0259cd41eee3b67c08438275d0e7a56716f7d792dde9d27cce0d773accbf2
SHA5123384bfe7a48a7e8b6d04a7129fdca133afeaab31687b9429415dbf4a438918b041d56c262bee2eea6c25e363439c89cdc3e15f1a17cc4dde74990c294d1f3c01
-
\??\Volume{553bd43f-0000-0000-0000-d08302000000}\System Volume Information\SPP\OnlineMetadataCache\{fa81e3e7-2f0a-405e-9ca2-40f6b58521ab}_OnDiskSnapshotProp
Filesize6KB
MD58ff6eaca9711acea4e3854ce201d0e94
SHA1785a1b17f9cc1f941a85e1a1988c32ad015bb7be
SHA256bca0d6b30813f6d63c2701b8d4f0da52e7c607cc7deae976e4e9bff7d9ac4fa7
SHA512ce93243bd5e6506015b5b467b8fbd4988bc6db604c7b8323da0de4ad79b2f37f3f8ca2799b69f7bc81c4eb7637b8e933da0ac73d2e3d5d39569cc9b07a4dda62