Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-02-2025 22:43
Static task
static1
Behavioral task
behavioral1
Sample
Chrome.msi
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Chrome.msi
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
Chrome.msi
Resource
win11-20250217-en
General
-
Target
Chrome.msi
-
Size
14.6MB
-
MD5
1ac2f26a8d6237713f6120d9272de355
-
SHA1
20f8d75d976f7af644bf8479ab1e611fe5bea55f
-
SHA256
1924b09ff1e25fe9d39bad70f094766863f366543658627fe94f435b07da6109
-
SHA512
150b5c3693c65d73f9bda9737dd560200abe1c0f95b1abf8e42ea43d80878fef5a39e9410b671ed4af1514e73542931aea96fcf7824067cca886c413672fa444
-
SSDEEP
393216:LBfMDSDSK12jqHzADE/FxGAl81nKJJ3g7xM9a6uAAARWMgyeG/z:5Mg2jUziiFxGAS1UJQNM9aE3RW1yemz
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral3/memory/972-114-0x0000000000400000-0x0000000000BA0000-memory.dmp family_blackmoon -
Fatalrat family
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral3/memory/1816-209-0x0000000010000000-0x000000001002D000-memory.dmp fatalrat behavioral3/memory/2552-173-0x0000000010000000-0x000000001002D000-memory.dmp fatalrat -
resource yara_rule behavioral3/files/0x001b00000002af6d-67.dat vmprotect behavioral3/memory/1296-69-0x00007FF794FC0000-0x00007FF795579000-memory.dmp vmprotect behavioral3/files/0x004b00000002af7a-111.dat vmprotect behavioral3/memory/972-114-0x0000000000400000-0x0000000000BA0000-memory.dmp vmprotect behavioral3/memory/772-117-0x00007FF794FC0000-0x00007FF795579000-memory.dmp vmprotect -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\StubPath = "\"C:\\Program Files\\Google\\Chrome\\Application\\133.0.6943.127\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Localized Name = "Google Chrome" setup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\ = "Google Chrome" setup.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe GoogleUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe\DisableExceptionChainValidation = "0" GoogleUpdate.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TjNkNpAilaYvt.exe.log TjNkNpAilaYvt.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer chrome.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\eventlog_provider.dll setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\os_update_handler.exe setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_hu.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\GoogleUpdate.exe GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\nb.pak setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_ml.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_mr.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\chrome_200_percent.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\en-GB.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\resources.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_en.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\psmachine_64.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\it.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\sk.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\ur.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\VisualElements\SmallLogoDev.png setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_zh-CN.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\es-419.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\gu.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\VisualElements\LogoDev.png setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\libGLESv2.dll setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\vk_swiftshader.dll setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_et.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_vi.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\CR_C2D85.tmp\setup.exe 133.0.6943.127_chrome_installer.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\am.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\fil.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\nl.pak setup.exe File created C:\Program Files\Google\Chrome\Application\133.0.6943.127\Installer\chrmstp.exe setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_sr.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\VisualElements\LogoCanary.png setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_sw.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\psmachine.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\el.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\et.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\zh-TW.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\WidevineCdm\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdate.exe GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_zh-TW.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\WidevineCdm\LICENSE setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\dxcompiler.dll setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\elevated_tracing_service.exe setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\elevation_service.exe setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_gu.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_ja.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_te.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\hu.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\ml.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\sw.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\v8_context_snapshot.bin setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_es.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_hr.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\133.0.6943.127_chrome_installer.exe GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\MEIPreload\preloaded_data.pb setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\VisualElements\Logo.png setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\chrome_pwa_launcher.exe setup.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_el.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_hi.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\goopdateres_pt-BR.dll GoogleUpdate.exe File created C:\Program Files (x86)\Google\Update\1.3.36.312\psuser_64.dll GoogleUpdate.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\es.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\Locales\he.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source4668_806430172\Chrome-bin\133.0.6943.127\vk_swiftshader_icd.json setup.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIED3E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEF76.tmp msiexec.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\GoogleUpdateCore.exe setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_es-419.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_no.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_ru.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_sl.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_sw.dll setup.exe File opened for modification C:\Windows\Installer\e57ece0.msi msiexec.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\GoogleUpdateOnDemand.exe setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_ar.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_cs.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_fa.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_mr.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_uk.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_zh-CN.dll setup.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_fr.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_hu.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_sr.dll setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Installer\MSIEF26.tmp msiexec.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_hr.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_id.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_sv.dll setup.exe File opened for modification C:\Windows\SystemTemp\chrome_installer.log setup.exe File opened for modification C:\Windows\Installer\MSIEF65.tmp msiexec.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\GoogleUpdate.exe setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_ca.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_en.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_lv.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_pt-PT.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_tr.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_zh-TW.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\GoogleUpdateBroker.exe setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\GoogleUpdateComRegisterShell64.exe setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_fi.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_hi.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_te.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_th.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\GoogleUpdateSetup.exe setup.exe File opened for modification C:\Windows\SystemTemp\GUM1D58.tmp\GoogleUpdateSetup.exe setup.exe File opened for modification C:\Windows\Installer\MSIEEF6.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF639F300FF42D62F0.TMP msiexec.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_am.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_da.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_lt.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_sk.dll setup.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File created C:\Windows\Installer\e57ece0.msi msiexec.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_bn.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_ms.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_vi.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_gu.dll setup.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DF1BC3264FCD36D810.TMP msiexec.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\psmachine.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_es.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_ko.dll setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\GoogleCrashHandler64.exe setup.exe File created C:\Windows\SystemTemp\GUM1D58.tmp\goopdateres_de.dll setup.exe -
Executes dropped EXE 49 IoCs
pid Process 1216 aa.exe 1296 scrok.exe 1508 TjNkNpAilaYvt.exe 2884 TjNkNpAilaYvt.exe 2636 TjNkNpAilaYvt.exe 4900 TjNkNpAilaYvt.exe 772 scrok.exe 972 setup.exe 4712 setup.exe 1816 svchost.exe 2552 svchost.exe 3488 svchost.exe 4636 GoogleUpdate.exe 4836 GoogleUpdate.exe 4528 GoogleUpdate.exe 1548 GoogleUpdateComRegisterShell64.exe 2600 GoogleUpdateComRegisterShell64.exe 2756 GoogleUpdateComRegisterShell64.exe 4812 GoogleUpdate.exe 3488 GoogleUpdate.exe 228 GoogleUpdate.exe 3840 133.0.6943.127_chrome_installer.exe 4668 setup.exe 2396 setup.exe 3928 setup.exe 5044 setup.exe 4032 GoogleCrashHandler.exe 4760 GoogleCrashHandler64.exe 1088 GoogleUpdate.exe 4036 GoogleUpdateOnDemand.exe 2320 GoogleUpdate.exe 3680 chrome.exe 4488 chrome.exe 2412 chrome.exe 1720 chrome.exe 2908 chrome.exe 2688 chrome.exe 4340 chrome.exe 1308 elevation_service.exe 244 chrome.exe 564 chrome.exe 4568 chrome.exe 4168 chrome.exe 3932 chrome.exe 1288 chrome.exe 4644 chrome.exe 1288 chrome.exe 4884 chrome.exe 228 chrome.exe -
Loads dropped DLL 63 IoCs
pid Process 1044 MsiExec.exe 1044 MsiExec.exe 1044 MsiExec.exe 1044 MsiExec.exe 1044 MsiExec.exe 1044 MsiExec.exe 1044 MsiExec.exe 4636 GoogleUpdate.exe 4836 GoogleUpdate.exe 4528 GoogleUpdate.exe 1548 GoogleUpdateComRegisterShell64.exe 4528 GoogleUpdate.exe 2600 GoogleUpdateComRegisterShell64.exe 4528 GoogleUpdate.exe 2756 GoogleUpdateComRegisterShell64.exe 4528 GoogleUpdate.exe 4812 GoogleUpdate.exe 3488 GoogleUpdate.exe 228 GoogleUpdate.exe 228 GoogleUpdate.exe 3488 GoogleUpdate.exe 1088 GoogleUpdate.exe 2320 GoogleUpdate.exe 2320 GoogleUpdate.exe 3680 chrome.exe 4488 chrome.exe 3680 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 1720 chrome.exe 2908 chrome.exe 1720 chrome.exe 2908 chrome.exe 2412 chrome.exe 2412 chrome.exe 2412 chrome.exe 2688 chrome.exe 4340 chrome.exe 2688 chrome.exe 4340 chrome.exe 244 chrome.exe 244 chrome.exe 564 chrome.exe 564 chrome.exe 4568 chrome.exe 4168 chrome.exe 4568 chrome.exe 4168 chrome.exe 3932 chrome.exe 3932 chrome.exe 1288 chrome.exe 1288 chrome.exe 4644 chrome.exe 4644 chrome.exe 1288 chrome.exe 4884 chrome.exe 1288 chrome.exe 4884 chrome.exe 228 chrome.exe 228 chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 3104 msiexec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleCrashHandler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleUpdateOnDemand.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4812 GoogleUpdate.exe 1088 GoogleUpdate.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2532 timeout.exe 4852 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 12 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Services\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\Group = "Fatal" svchost.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\ svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Services\InstallTime = "2025-02-21 22:44" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133846515165292626" chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\ = "IGoogleUpdate3Web" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\ = "IAppBundleWeb" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.OnDemandCOMClassMachine\CurVer\ = "GoogleUpdate.OnDemandCOMClassMachine.1.0" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6F8BD55B-E83D-4A47-85BE-81FFA8057A69}\LocalServer32\ = "\"C:\\Program Files (x86)\\Google\\Update\\1.3.36.312\\GoogleUpdateBroker.exe\"" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CoCreateAsync.1.0\ = "CoCreateAsync" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C6271107-A214-4F11-98C0-3F16BC670D28}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Update\\1.3.36.312\\psmachine_64.dll" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D656199B-93F2-4D64-AA2F-96BD3F18D40E} GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\NumMethods GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\VersionIndependentProgID GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B}\NumMethods\ = "5" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.ProcessLauncher.1.0\CLSID\ = "{ABC01078-F197-4B0B-ADBC-CFE684B39C82}" GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{598FE0E5-E02D-465D-9A9D-37974A28FD42}\ELEVATION GoogleUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2C6CB58-C076-425C-ACB7-6D19D64428CD} setup.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{4EB61BAC-A3B6-4760-9581-655041EF4D69}\PROGID GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DB17455-4E85-46E7-9D23-E555E4B005AF} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{ABC01078-F197-4B0B-ADBC-CFE684B39C82}\ProgID\ = "GoogleUpdate.ProcessLauncher.1.0" GoogleUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{463ABECF-410D-407F-8AF5-0DF35A005CC8} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{463ABECF-410D-407F-8AF5-0DF35A005CC8}\1.0\0\win64\ = "C:\\Program Files\\Google\\Chrome\\Application\\133.0.6943.127\\elevation_service.exe" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5B25A8DC-1780-4178-A629-6BE8B8DEFAA2}\NumMethods GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.OnDemandCOMClassMachine.1.0\ = "Google Update Broker Class Factory" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeHTML\DefaultIcon\ = "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe,10" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34527502-D3DB-4205-A69B-789B27EE0414}\NumMethods\ = "23" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{05A30352-EB25-45B6-8449-BCA7B0542CE5} GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2D363682-561D-4C3A-81C6-F2F82107562A}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{76F7B787-A67C-4C73-82C7-31F5E3AABC5C}\ = "IApp" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4DE778FE-F195-4EE3-9DAB-FE446C239221}\NumMethods\ = "11" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.OnDemandCOMClassMachineFallback.1.0\ = "Google Update Legacy On Demand" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DB17455-4E85-46E7-9D23-E555E4B005AF}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B3D28DBD-0DFA-40E4-8071-520767BADC7E}\VersionIndependentProgID\ = "GoogleUpdate.OnDemandCOMClassMachineFallback" GoogleUpdate.exe Key created \REGISTRY\MACHINE\Software\Classes\.mhtml\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\Software\Classes\.webp\OpenWithProgids setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{49D7563B-2DDB-4831-88C8-768A53833837} GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FE908CDD-22BB-472A-9870-1A0390E42F36}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\GoogleUpdate.exe\AppID = "{9465B4B4-5216-4042-9A2C-754D3BCDC410}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2E629606-312A-482F-9B12-2C4ABF6F0B6D}\ = "ICoCreateAsyncStatus" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA} GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\ProxyStubClsid32\ = "{82BB48E2-2057-4C07-A383-B2C2F8A0FD01}" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B2340A0-4068-43D6-B404-32E27217859D}\Elevation\IconReference = "@C:\\Program Files (x86)\\Google\\Update\\1.3.36.312\\goopdate.dll,-1004" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FE908CDD-22BB-472A-9870-1A0390E42F36}\ProxyStubClsid32 GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB} GoogleUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\ELEVATION GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{084D78A8-B084-4E14-A629-A2C419B0E3D9}\NumMethods\ = "43" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{A2C6CB58-C076-425C-ACB7-6D19D64428CD}\LocalServer32 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31AC3F11-E5EA-4A85-8A3D-8E095A39C27B}\NumMethods GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3D05F64F-71E3-48A5-BF6B-83315BC8AE1F}\ProxyStubClsid32 GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3D05F64F-71E3-48A5-BF6B-83315BC8AE1F}\NumMethods\ = "12" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B3A47570-0A85-4AEA-8270-529D47899603}\NumMethods\ = "4" GoogleUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4} GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8A1D4361-2C08-4700-A351-3EAA9CBFF5E4}\ProgID GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CoreMachineClass\CLSID\ = "{9B2340A0-4068-43D6-B404-32E27217859D}" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.CoreClass.1\CLSID\ = "{E225E692-4B47-4777-9BED-4FD7FE257F0E}" GoogleUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{76F7B787-A67C-4C73-82C7-31F5E3AABC5C} GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{909489C2-85A6-4322-AA56-D25278649D67}\NumMethods\ = "4" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.PolicyStatusMachine\ = "Google Update Broker Class Factory" GoogleUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\NumMethods\ = "10" GoogleUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.Update3WebMachineFallback\CurVer\ = "GoogleUpdate.Update3WebMachineFallback.1.0" GoogleUpdate.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 4192 msiexec.exe 4192 msiexec.exe 1296 scrok.exe 1296 scrok.exe 1296 scrok.exe 1296 scrok.exe 4900 TjNkNpAilaYvt.exe 972 setup.exe 972 setup.exe 772 scrok.exe 772 scrok.exe 772 scrok.exe 772 scrok.exe 4636 GoogleUpdate.exe 4636 GoogleUpdate.exe 4636 GoogleUpdate.exe 4636 GoogleUpdate.exe 4636 GoogleUpdate.exe 4636 GoogleUpdate.exe 3488 GoogleUpdate.exe 3488 GoogleUpdate.exe 1088 GoogleUpdate.exe 1088 GoogleUpdate.exe 4636 GoogleUpdate.exe 4636 GoogleUpdate.exe 4636 GoogleUpdate.exe 4636 GoogleUpdate.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3104 msiexec.exe Token: SeIncreaseQuotaPrivilege 3104 msiexec.exe Token: SeSecurityPrivilege 4192 msiexec.exe Token: SeCreateTokenPrivilege 3104 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3104 msiexec.exe Token: SeLockMemoryPrivilege 3104 msiexec.exe Token: SeIncreaseQuotaPrivilege 3104 msiexec.exe Token: SeMachineAccountPrivilege 3104 msiexec.exe Token: SeTcbPrivilege 3104 msiexec.exe Token: SeSecurityPrivilege 3104 msiexec.exe Token: SeTakeOwnershipPrivilege 3104 msiexec.exe Token: SeLoadDriverPrivilege 3104 msiexec.exe Token: SeSystemProfilePrivilege 3104 msiexec.exe Token: SeSystemtimePrivilege 3104 msiexec.exe Token: SeProfSingleProcessPrivilege 3104 msiexec.exe Token: SeIncBasePriorityPrivilege 3104 msiexec.exe Token: SeCreatePagefilePrivilege 3104 msiexec.exe Token: SeCreatePermanentPrivilege 3104 msiexec.exe Token: SeBackupPrivilege 3104 msiexec.exe Token: SeRestorePrivilege 3104 msiexec.exe Token: SeShutdownPrivilege 3104 msiexec.exe Token: SeDebugPrivilege 3104 msiexec.exe Token: SeAuditPrivilege 3104 msiexec.exe Token: SeSystemEnvironmentPrivilege 3104 msiexec.exe Token: SeChangeNotifyPrivilege 3104 msiexec.exe Token: SeRemoteShutdownPrivilege 3104 msiexec.exe Token: SeUndockPrivilege 3104 msiexec.exe Token: SeSyncAgentPrivilege 3104 msiexec.exe Token: SeEnableDelegationPrivilege 3104 msiexec.exe Token: SeManageVolumePrivilege 3104 msiexec.exe Token: SeImpersonatePrivilege 3104 msiexec.exe Token: SeCreateGlobalPrivilege 3104 msiexec.exe Token: SeBackupPrivilege 4540 vssvc.exe Token: SeRestorePrivilege 4540 vssvc.exe Token: SeAuditPrivilege 4540 vssvc.exe Token: SeBackupPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeRestorePrivilege 4192 msiexec.exe Token: SeTakeOwnershipPrivilege 4192 msiexec.exe Token: SeDebugPrivilege 1296 scrok.exe Token: SeDebugPrivilege 1508 TjNkNpAilaYvt.exe Token: SeDebugPrivilege 2884 TjNkNpAilaYvt.exe Token: SeBackupPrivilege 4700 srtasks.exe Token: SeRestorePrivilege 4700 srtasks.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3104 msiexec.exe 3104 msiexec.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe 3680 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 972 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4700 4192 msiexec.exe 88 PID 4192 wrote to memory of 4700 4192 msiexec.exe 88 PID 4192 wrote to memory of 1044 4192 msiexec.exe 90 PID 4192 wrote to memory of 1044 4192 msiexec.exe 90 PID 4192 wrote to memory of 1044 4192 msiexec.exe 90 PID 1044 wrote to memory of 4832 1044 MsiExec.exe 91 PID 1044 wrote to memory of 4832 1044 MsiExec.exe 91 PID 1044 wrote to memory of 4832 1044 MsiExec.exe 91 PID 4832 wrote to memory of 4852 4832 cmd.exe 93 PID 4832 wrote to memory of 4852 4832 cmd.exe 93 PID 4832 wrote to memory of 4852 4832 cmd.exe 93 PID 4832 wrote to memory of 1216 4832 cmd.exe 94 PID 4832 wrote to memory of 1216 4832 cmd.exe 94 PID 4832 wrote to memory of 1216 4832 cmd.exe 94 PID 4832 wrote to memory of 1296 4832 cmd.exe 95 PID 4832 wrote to memory of 1296 4832 cmd.exe 95 PID 1296 wrote to memory of 824 1296 scrok.exe 8 PID 1296 wrote to memory of 824 1296 scrok.exe 8 PID 1296 wrote to memory of 824 1296 scrok.exe 8 PID 4832 wrote to memory of 1508 4832 cmd.exe 96 PID 4832 wrote to memory of 1508 4832 cmd.exe 96 PID 4832 wrote to memory of 2884 4832 cmd.exe 97 PID 4832 wrote to memory of 2884 4832 cmd.exe 97 PID 4832 wrote to memory of 2532 4832 cmd.exe 98 PID 4832 wrote to memory of 2532 4832 cmd.exe 98 PID 4832 wrote to memory of 2532 4832 cmd.exe 98 PID 4832 wrote to memory of 2636 4832 cmd.exe 99 PID 4832 wrote to memory of 2636 4832 cmd.exe 99 PID 4832 wrote to memory of 772 4832 cmd.exe 102 PID 4832 wrote to memory of 772 4832 cmd.exe 102 PID 4900 wrote to memory of 972 4900 TjNkNpAilaYvt.exe 101 PID 4900 wrote to memory of 972 4900 TjNkNpAilaYvt.exe 101 PID 4900 wrote to memory of 972 4900 TjNkNpAilaYvt.exe 101 PID 772 wrote to memory of 824 772 scrok.exe 8 PID 772 wrote to memory of 824 772 scrok.exe 8 PID 772 wrote to memory of 824 772 scrok.exe 8 PID 4832 wrote to memory of 4712 4832 cmd.exe 103 PID 4832 wrote to memory of 4712 4832 cmd.exe 103 PID 4832 wrote to memory of 4712 4832 cmd.exe 103 PID 972 wrote to memory of 1816 972 setup.exe 104 PID 972 wrote to memory of 1816 972 setup.exe 104 PID 972 wrote to memory of 1816 972 setup.exe 104 PID 972 wrote to memory of 2552 972 setup.exe 105 PID 972 wrote to memory of 2552 972 setup.exe 105 PID 972 wrote to memory of 2552 972 setup.exe 105 PID 972 wrote to memory of 3488 972 setup.exe 114 PID 972 wrote to memory of 3488 972 setup.exe 114 PID 972 wrote to memory of 3488 972 setup.exe 114 PID 4712 wrote to memory of 4636 4712 setup.exe 107 PID 4712 wrote to memory of 4636 4712 setup.exe 107 PID 4712 wrote to memory of 4636 4712 setup.exe 107 PID 4636 wrote to memory of 4836 4636 GoogleUpdate.exe 108 PID 4636 wrote to memory of 4836 4636 GoogleUpdate.exe 108 PID 4636 wrote to memory of 4836 4636 GoogleUpdate.exe 108 PID 4636 wrote to memory of 4528 4636 GoogleUpdate.exe 109 PID 4636 wrote to memory of 4528 4636 GoogleUpdate.exe 109 PID 4636 wrote to memory of 4528 4636 GoogleUpdate.exe 109 PID 4528 wrote to memory of 1548 4528 GoogleUpdate.exe 110 PID 4528 wrote to memory of 1548 4528 GoogleUpdate.exe 110 PID 4528 wrote to memory of 2600 4528 GoogleUpdate.exe 111 PID 4528 wrote to memory of 2600 4528 GoogleUpdate.exe 111 PID 4528 wrote to memory of 2756 4528 GoogleUpdate.exe 112 PID 4528 wrote to memory of 2756 4528 GoogleUpdate.exe 112 PID 4636 wrote to memory of 4812 4636 GoogleUpdate.exe 113 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:824
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe" -Embedding2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ondemand3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer4⤵
- Checks system information in the registry
- Drops file in Windows directory
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.127 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbced3fff8,0x7ffbced40004,0x7ffbced400105⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1884,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1880 /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1424,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2152 /prefetch:115⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2276,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2232 /prefetch:135⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3168 /prefetch:15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3228 /prefetch:15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3700,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3740 /prefetch:15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3716,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3920 /prefetch:95⤵
- Executes dropped EXE
- Loads dropped DLL
PID:244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3276,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4584 /prefetch:15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4696,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4740 /prefetch:15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5456,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5464 /prefetch:145⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5548,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5584 /prefetch:15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5576,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5640 /prefetch:15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3932,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3936 /prefetch:145⤵
- Executes dropped EXE
- Loads dropped DLL
PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3924,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3732 /prefetch:145⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4108,i,15774481183621382788,14135382186652478567,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5696 /prefetch:145⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4884
-
-
-
-
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Chrome.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3104
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 7E2488391F0B9060D3A105704FF0C7542⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe" /c timeout /nobreak /t 7 & C:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData & C:\ProgramData\Packas\scrok.exe & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & C:\ProgramData\Smart\TjNkNpAilaYvt.exe install & timeout /nobreak /t 2 & C:\ProgramData\Smart\TjNkNpAilaYvt.exe start & C:\ProgramData\Packas\scrok.exe & del C:\ProgramData\Packas\scrok.exe & C:\ProgramData\setup\setup.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 74⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4852
-
-
C:\ProgramData\setup\aa.exeC:\ProgramData\setup\aa.exe x C:\ProgramData\setup\ddd. -key 000000 -f -to C:\ProgramData4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1216
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1296
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe install4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\SysWOW64\timeout.exetimeout /nobreak /t 24⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2532
-
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exeC:\ProgramData\Smart\TjNkNpAilaYvt.exe start4⤵
- Executes dropped EXE
PID:2636
-
-
C:\ProgramData\Packas\scrok.exeC:\ProgramData\Packas\scrok.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:772
-
-
C:\ProgramData\setup\setup.exeC:\ProgramData\setup\setup.exe4⤵
- Drops file in Windows directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SystemTemp\GUM1D58.tmp\GoogleUpdate.exeC:\Windows\SystemTemp\GUM1D58.tmp\GoogleUpdate.exe /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={9F0C1F44-1C50-396A-483A-08DA4896FF0B}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"5⤵
- Event Triggered Execution: Image File Execution Options Injection
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regsvc6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4836
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /regserver6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1548
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2600
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:2756
-
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4812
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={9F0C1F44-1C50-396A-483A-08DA4896FF0B}&lang=zh-CN&browser=4&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{D4B5E4AE-EFD3-4B5E-B108-9958F5F7CB66}"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
C:\ProgramData\Smart\TjNkNpAilaYvt.exe"C:\ProgramData\Smart\TjNkNpAilaYvt.exe"1⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\ProgramData\Smart\setup.exe"C:\ProgramData\Smart\setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2552
-
-
C:\ProgramData\NVIDIARV\svchost.exe"C:\ProgramData\NVIDIARV\svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3488
-
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc1⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:228 -
C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\133.0.6943.127_chrome_installer.exe"C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\133.0.6943.127_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\gui84CD.tmp"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
PID:3840 -
C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\CR_C2D85.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\CR_C2D85.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\CR_C2D85.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\gui84CD.tmp"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Program Files directory
- Drops file in Windows directory
- Executes dropped EXE
- Modifies registry class
PID:4668 -
C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\CR_C2D85.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\CR_C2D85.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff635bebed8,0x7ff635bebee4,0x7ff635bebef04⤵
- Drops file in Windows directory
- Executes dropped EXE
PID:2396
-
-
C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\CR_C2D85.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\CR_C2D85.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Drops file in Windows directory
- Executes dropped EXE
PID:3928 -
C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\CR_C2D85.tmp\setup.exe"C:\Program Files (x86)\Google\Update\Install\{31457A37-2301-4D41-AF8A-8BB7C153D407}\CR_C2D85.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.127 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff635bebed8,0x7ff635bebee4,0x7ff635bebef05⤵
- Drops file in Windows directory
- Executes dropped EXE
PID:5044
-
-
-
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4032
-
-
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe"C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe"2⤵
- Executes dropped EXE
PID:4760
-
-
C:\Program Files (x86)\Google\Update\GoogleUpdate.exe"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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-PGV2ZW50IGV2ZW50dHlwZT0iOSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBkb3dubG9hZGVyPSJiaXRzIiB1cmw9Imh0dHA6Ly9lZGdlZGwubWUuZ3Z0MS5jb20vZWRnZWRsL3JlbGVhc2UyL2Nocm9tZS9hdTJuMzJoM2huY25jNWtjbjUyd3hheHp4YV8xMzMuMC42OTQzLjEyNy8xMzMuMC42OTQzLjEyN19jaHJvbWVfaW5zdGFsbGVyLmV4ZSIgZG93bmxvYWRlZD0iMTE4OTI5MjY0IiB0b3RhbD0iMTE4OTI5MjY0IiBkb3dubG9hZF90aW1lX21zPSIxNjc2NSIvPjxldmVudCBldmVudHR5cGU9IjEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI2IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzA3IiBzb3VyY2VfdXJsX2luZGV4PSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iNjcyIiBkb3dubG9hZF90aW1lX21zPSIxNzg1OSIgZG93bmxvYWRlZD0iMTE4OTI5MjY0IiB0b3RhbD0iMTE4OTI5MjY0IiBpbnN0YWxsX3RpbWVfbXM9IjMwMjUwIi8-PC9hcHA-PC9yZXF1ZXN0Pg2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.127\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.127\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Installer Packages
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD550af36bdb099da8bf0f80d4f235ee0a7
SHA1806a6c07c496b6bce021abb3e209a255a4d0c923
SHA256b6b0dfb4e9a2013911ea18085d67bd35a0e6f1f018f86730e91d13faf7c63f7c
SHA512a31660b0eac3acdae6fd5cd9fdd7661c7c3f7d52bcd30ac6788d239f0cc2e4c098e6390868ba28825ee2f29e3611f7b76eb336f242809465043e3edef10a3bc2
-
Filesize
158KB
MD5cdf152e23a8cbf68dbe3f419701244fc
SHA1cb850d3675da418131d90ab01320e4e8842228d7
SHA25684eaf43f33d95da9ab310fc36dc3cfe53823d2220946f021f18cf3f729b8d64e
SHA512863e1da5bc779fa02cf08587c4de5f04c56e02902c5c4f92a06f2e631380ecabcc98e35d52609f764727e41b965c0786d24ea23fc4b9776d24d9f13e0d8ae0c2
-
Filesize
6.0MB
MD53eda07f3f5bd229c5a02ca9487dd152d
SHA1b6b845c42e2316b63a61a058eb1a9714211a54ec
SHA256cba6ac1785a616fbffb09afb29cc8b5d9a82a019d9b547338aa09b6a06905e11
SHA512e8a0d0308f955f923753380033ebf12a795d9e3dd57e155e46ff6d709c9a4a71a24227b79a129773e6209eb1039202928a9515294833b36c218f44d787349aa6
-
Filesize
3.3MB
MD54ce1a842d3d770f6fa4b4167542408b2
SHA143b0c03b176318ce2551d3dfc2c18e18f53c2240
SHA256ba51980ef9681d849c9331e891cc411c1687d3c011f0acc01da9f4ef640764b6
SHA512a28f0659af75da93f479359212dc4ffb9440f171cf89b19de929b7a8015b5e087ea53ab979dd6815597865538c79b1e3354e987940da88da4dfcf16bdf1f4337
-
Filesize
2.7MB
MD5a03b2eaa4d517fd935bb0032d444f22d
SHA1014864aac638b7c04b4d50e6c39d7266eafda773
SHA2566fd145b1de7d0a143fd25274544d5e3c4ecee06cf3e31631d51cae8ca3e25f01
SHA51268a253fcdb3cd1a086fe93fa7c8a7500d6b5414bdfc0dad555973697d4fb552e09088b849573f705ca91b1652ddd4572842b82d40f5821761b3ac299e465be51
-
Filesize
832KB
MD5d305d506c0095df8af223ac7d91ca327
SHA1679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a
SHA256923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66
SHA51294d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796
-
Filesize
1009B
MD598b47370ab972c9305cadea2debeaff2
SHA17d1671214c25f32a20e3026be2eaefb7c2274868
SHA256d2d8b8323183bcb0deea43b5e03c5451fe825e8d55b90ae75086e618981b90d4
SHA512a1fb95df29617833cd1b7c7c5c35f73c392691dc01db8561030ecf33aaedb87723c6e846adc45fe819a42765a20aedb7a7979f34b4c430b2090b056fad98f83e
-
Filesize
266B
MD591096cda41621409cf7d40786e70ade1
SHA1e6b7df467b318c978967cd3dc380f955ff68f48e
SHA25678e221ebd5a8a598c66b871ec3bdb64b5bdd60fd033af3486d56c654c8d00d16
SHA512158d4c8912b8bd7c1dd35c4199d4cfb4a11be38f209dfe31d96cec070a2f0c11aada032be98e948d8e49baaa1dc101b84ce9da75c14f9cf96163a878b3c6f607
-
Filesize
613B
MD5d2e83b37891e38c727813994eaa109d6
SHA1ed0bd3065150dd42f0ca142cde085f4453c3b8a3
SHA2566d136298617f815bcfaa9b744f7a92f056e96640b5a4939caba445a78ffdcd26
SHA51213b0334155757e7670154115f9caa4e72122ef2d5a7323fc0b0fe6b568ce1cf7e4e5aa73f619f3fac2b966cb9fa149f609b767ade18d92b54b0be96b7f06c296
-
Filesize
833B
MD5c0a55b43b02d152525d0a46ca82ee60f
SHA10311ca1bec84e63178a8fc66fa83af8e594be851
SHA256f6d3755a15fff4618c85a0f97b6db7f7e30810e96ceba4e91e2958183e492d19
SHA512758f4adaa047864a941b9c8c948215ec767a4112cbf4e7c9e669071bd4e6c7362724a29eca899bad25e17e92fa26942f1d0a72cbb9f02ed90118d51c0be8ef33
-
Filesize
298B
MD52c706293a3cfff8cc184a8e9a3b3da08
SHA1873d7c9f51aa6cebd4ad3ae5930d1de84bb4437d
SHA256ed28baf8be3a588d50ed246c2cd741bbd498aee74ea0675d57e0b33236e22067
SHA5124aba3e25507ba5c29219ff51553f3616d07aeeb30f7465f9e921eea94cdcb411d1f48d1eefed647c22405df275e7f9d7506aac52202aae137391c6831463b043
-
Filesize
4.7MB
MD5118a9a9f6280e177fdac16989b8aa1a5
SHA1fc37316439372be17a982d02cd0d294f7aaca751
SHA256b995e6a0299f2465fd5881157aab1c6c9753c8e459efd661b9cd1e83be7e53f6
SHA51214c731e7f7e9736f39d6c79a98bf1a3264da9dc76bab4faca82ec64f276f3d39c9bc4638991e30a06f52bf6204619f5da8c3168d11afe058e0c1d21a89d42878
-
Filesize
1.0MB
MD509c448be7e7d84e6e544cc03afbb05d8
SHA1ddc13e71a72bc49c60f89b98cbb79c2449cfa07e
SHA256a0f127a70943b0262060498c1723c795a8e2980f1acf0c42ee8c1dae72ae54b5
SHA512e5f7a988a999e7e34d0aa2d2a5b2fbb22689588d3def4bed4518ceed38710e3714c5614bab192b0ce6bcac5172a87ebf3b3b923e495eb7344c70bd11f4bf1c12
-
Filesize
10.8MB
MD59bd359e3956d119811c3a6abef58e644
SHA19f221781f406ebcb15fc2c02d5d259116155c734
SHA256ead38673817c84de77a4d2fe6118e6a96f863e3db38f73518007caa2af676146
SHA5127f817794728e532da07424c621eeef161501644d137068895391505d7110f1f8ee9dc76944946e3960f84e462c66fd82ee61b619ca91a07166aed5d3434f618b
-
Filesize
1.3MB
MD54a94844260d6a08828d781d488cef61d
SHA1de8169fdb5ab8a120df577d92eb25a2767431738
SHA25646d7a8abe3bb9d7302529246cd8ee6e7d0360d1045fe92662cc7580e72ef5132
SHA51282549c1e525a90003fb0174ebba2bc3b4f58706ef9fd5e6ee07d489ab536ef286e408db6c15a52b039d3f59c09bd55e35d045def79007da5d414d5d589d34f4f
-
Filesize
414B
MD51fc8c22b9b297bf981a817f857c64dcd
SHA1df694d4f45af84aa37d2a512335b13db4c42e9ab
SHA256324726277f41d3b8e93c7c5912d16509b92957d0bcbec0ddfaad26d275855054
SHA512a608c54ca9e64b8300209008de39c3ffa2f2c7b855128721b3ec1d2fa3138f35f301c97aaecc7642a91131e358219bffa3300d715edb7dea0168285f7e0c292e
-
Filesize
96B
MD542f2eca9223345f140b8cb8a8ad35bcd
SHA10bb64f779dac739f76e1a76ad7a72135e615a64f
SHA256bd4bba23d619c0cf37c287523be82f4daf05eec1e43f7669a50dad09b49397ca
SHA5128419764cf30be25540191a5c6257484f20c467e6e2599824db45a003eef1579284d5a4d88e1fe9c6e9021da1b842b0cb7adc3560b7118b1f36ceff8b72cf9604
-
Filesize
192KB
MD5505a174e740b3c0e7065c45a78b5cf42
SHA138911944f14a8b5717245c8e6bd1d48e58c7df12
SHA256024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d
SHA5127891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD5f8d4287ea0cdb2c4ec9e0680184b4a73
SHA14341d0cefc2ad5d33d887814a98e3def14a42d51
SHA256b0623f4b39fe02134133fa659827b6d0a5b1fca483bed496ba67d8989f68cb97
SHA512fef1c765ded29dd0a83028085026265f81f1cf9bcc2267f142a455154817c379ed73ca19be456d3972a46dd203669256c6648a299c03d337108a295bc43774ca
-
Filesize
15KB
MD55a4d73300631980ac3f2fb8d67449181
SHA1f1eaca234c2764e14622b13a6137817a0265c921
SHA2568da0d59fc2346da112421259aad2a73afa1c90323900b9df324e17a8049fb152
SHA51218746df84a01767a808aeeb3e6b522693117853527d16997ddfd591e8599db867f3db2717819784d2c58eada76712a5057e0b8f46acc308ea9aa067556912f9a
-
Filesize
38B
MD5b77fc97eecd8f7383464171a4edef544
SHA1bbae26d2a7914a3c95dca35f1f6f820d851f6368
SHA25693332c49fab1deb87dac6cb5d313900cb20e6e1ba928af128a1d549a44256f68
SHA51268745413a681fdf4088bf8d6b20e843396ae2e92fbb97239dc6c764233a7e7b700a51548ff4d2ea86420b208b92a5e5420f08231637fbb5dbf7e12a377be3fc3
-
Filesize
195KB
MD5de816953bc01a7b59479c0a397f4e582
SHA11d9599dafeeaea070c8d02f9c640fddacd4fcc11
SHA2563b84fab0f3d06e7a668944dfe30e8e278656430a46e416b66716d797de40499f
SHA512bb0b12ed9be857e0b604c85801b1f0f61611275adf194bb069e0aa3a07b3d1e799ff10e2e37c0d22db798c7d0288095cfdf1c615eecf7debe3e20402fbef7916
-
Filesize
122KB
MD523810d0139fb5da5dd6bb342ae5a7dd4
SHA1be27ec888765ce79edcf9224ed264ff4565c8b6b
SHA256ad63c855ad97d69ddb74c2ed5331c576532f8a30b84df33c93ab4a4cc9b580c5
SHA512de4a173d2258faf20386184f559dd842b11844baf42d3621c91cff0ea11e2628b6e7204a7a844d6b1f71c5370d1732b7016da147a20941ba05a68e130063de6d
-
Filesize
195KB
MD538d556e93471442e021bb43e896dd530
SHA1aec23624a01159c95096d3c75be32903581b741b
SHA256385686ea971b656a59a7ac42cfd5f18b911d13b8ea869b3dbb33db8a98a3a6d0
SHA512a1300cd5685e6eb3920c8fedfc827bc0948e0207ae2b8f19a91cdae7d800dc4e526160a88e9701dddd0d6158788f92e40401127186c16e1d380ee9c34360b658
-
Filesize
1KB
MD58005734c5c8a27f0225756ad8ab852df
SHA15a611231e25aa2a4dec287c01750da7fa743e981
SHA256c7fe4d0b82bec7d44e817c76123b381269d494e2ff4a7f539ad53eb3ef5c4371
SHA512d2c653d0c22503817c9176f93c5e330c9c0d4a244d2e254f9bc895955ef8630e5fd83b5c22459dee5f18a3e1e016a638918087106e54b2fd169b435030d7c60b
-
Filesize
587KB
MD5c7fbd5ee98e32a77edf1156db3fca622
SHA13e534fc55882e9fb940c9ae81e6f8a92a07125a0
SHA256e140990b509dd6884a5742bde64f2cdaa10012d472b0b32de43ebecbc83242b6
SHA5128691ac8b214cc1e4f34a3ab2bbc0c2391f7f11ebbe5db0dc82825195b5fe5a05310ed1e14d253a9b74a64050d2f2a6623dd2fcd912f80fef51e51845ef1e3a1a
-
Filesize
1.1MB
MD5ae463676775a1dd0b7a28ddb265b4065
SHA1dff64c17885c7628b22631a2cdc9da83e417d348
SHA25683fbfcaff3da3eb89f9aec29e6574cf15502fd670cbb2ab0c8a84451b2598b22
SHA512e47c2db249e7a08c5d2864671fbc235e48aebecbe0b2c2334d1a4cba1b5b3037522ff89408589f3559b3a1eaf507bd338645387d55800029bb3b941d4c7744d6
-
Filesize
294KB
MD5a11ce10ac47f5f83b9bc980567331a1b
SHA163ee42e347b0328f8d71a3aa4dde4c6dc46da726
SHA256101dbf984c4b3876defe2699d6160acbf1bb3f213e02a32f08fdcdc06821c542
SHA512ff2f86c4061188ead1bfeebd36de7dbc312adcc95267537697f2bfcbb0c53e7c4ab0cd268cef22f0182391796c4612c97cbdc1266d9ee1960cdd2610d8c2bcb3
-
Filesize
392KB
MD5b659663611a4c2216dff5ab1b60dd089
SHA19a14392a5bdb9ea6b8c3e60224b7ff37091d48b5
SHA256cad4aa1cf58f6b2e2aceb789d53b18418e67066ec406b2fac786cb845ef89d2b
SHA5121065f9072cd6f1f4364f1354108f2647ee1d89f87e908a22fcd63bd3149c864c457e62268067a439d0486d8d4aa150aa984ad8ac8b51cae49014b67b80496040
-
Filesize
181KB
MD5be535d8b68dd064442f73211466e5987
SHA1aa49313d9513fd9c2d2b25da09ea24d09cc03435
SHA256c109bcb63391ac3ea93fb97fbdf3f6ed71316cacb592ef46efaea0024bc9ed59
SHA512eb50eebeaf83be10aea8088e35a807f9001d07d17d2bc1655c3bc0cb254d0f54303348988514ba5590ebd9d3bde3f1149c3f700f62fbce63c0199ea3cfb1f638
-
Filesize
217KB
MD5af51ea4d9828e21f72e935b0deae50f2
SHA1c7fe57c2a16c9f5a5ebdd3cc0910427cba5308bd
SHA2563575011873d0f6d49c783095dae06e6619f8f5463da578fbe284ca5d1d449619
SHA512ec9828d0bade39754748fb53cfc7efdc5e57955198bac3c248ea9b5a9a607182bb1477819f220549a8e9eadbe6bf69a12da6c8af3761980d2dd9078eaeaa932f
-
Filesize
1.9MB
MD5dae72b4b8bcf62780d63b9cbb5b36b35
SHA11d9b764661cfe4ee0f0388ff75fd0f6866a9cd89
SHA256b0ca6700e7a4ea667d91bcf3338699f28649c2e0a3c0d8b4f2d146ab7c843ab6
SHA512402c00cab6dac8981e200b6b8b4263038d76afe47c473d5f2abf0406222b32fff727b495c6b754d207af2778288203ce0774a6200b3e580e90299d08ce0c098f
-
Filesize
42KB
MD5849bc7e364e30f8ee4c157f50d5b695e
SHA1b52b8efa1f3a2c84f436f328decd2912efeb1b18
SHA256f1384a25a6f40e861455c62190d794415f3e9bfca6317c214847e9535dfc3fb9
SHA5126fd7f542a7073b3bbf1b0c200bb306b30f1b35a64a1fb013f25c7df76f63ef377d9bd736e8da2e9372f1c994785eaeedb6b60e3a0d4a4e8734c266ad61782d3b
-
Filesize
41KB
MD5163695df53cea0728f9f58a46a08e102
SHA171b39eec83260e2ccc299fac165414acb46958bd
SHA256f89dddda3e887385b42ea88118ba8fb1cc68fde0c07d44b851164564eb7c1ec8
SHA5126dfb70a175097f3c96ae815a563c185136cb5a35f361288cc81570facfa1f1d28f49eaa61172d1da4982ebb76bd3e32c4de77cf97dedfb79f18113d7594d0989
-
Filesize
44KB
MD5c523ec13643d74b187b26b410d39569b
SHA146aff0297036c60f22ad30d4e58f429890d9e09d
SHA25680505863866bcd93a7e617dd8160531401d6d05f48d595348cd321cf7d97aeac
SHA512ecf98e29a3481b05ab23c3ff89fa3caf054b874ed15462a5e33022aacf561d8fea4a0de35cc5f7450f62110ca4ace613e0c67f543ad22eb417e79eb3ebf24ed7
-
Filesize
44KB
MD5dafa45a82ce30cf2fd621e0a0b8c031f
SHA1e39ed5213f9bb02d9da2c889425fab8ca6978db7
SHA256d58e5f0fa894123de1d9b687a5b84826e095eca128ee5df8870f2db74f4233a2
SHA5122b772ebc128eb59d636eec36583329962ead8e0a399fd56394b1244486bf815f4e033ceef74a62a9930ab2bf6ec1ba5e2d3c942183f7cb2355a716a3e2c6c7a1
-
Filesize
44KB
MD539e25ba8d69f493e6f18c4ef0cf96de8
SHA15584a94a85d83514a46030c4165e8f7a942e63e2
SHA2561f66ebdcaae482a201a6e0fab9c1f4501c23a0d4ad819ccd555fdca9cc7edb94
SHA512773c995b449d64e36eb8cab174db29e29e29985bcfd714799d6b05b01bb7d4a0fc2aefaf2e27ff02b0e105fbe0d34d7efe29b193a1bc3365ec47e1f1003bed26
-
Filesize
43KB
MD5b9033db8d0e5bf254979b0f47d10e93d
SHA12859de0d851b5f4fd3056e8f9015cece2436c307
SHA25612c41c2f472b6a05fd6392e9d4f8aeb9a40840c2cbefd68b39d20f9d1d4d77ed
SHA51252075df4ae5c86ebb0bac20604ea072a163761ae058c1473211bf4bb0eeed043cfc5a92386f876b53484cdf4e3f8a7b75d8f4bf9894c24f8c22ec23a50b70b7c
-
Filesize
43KB
MD59f2e018a4f9a1d278983d0b677b91218
SHA1c58ee1fc0d8ef9d99f85426b48c7f28f381a2c17
SHA256d0dcdc68236eecd6b5f0b437eb92b8935741dabf1fa276a552399815af22edec
SHA51220b74b6a9f81527d4a5fe30671d2559261fb682576f4ab04da7856280fbbaeb6af83894009c9d7cb83deeae988d0ac5ec7ec32b277b7eb45829faec2857d7014
-
Filesize
45KB
MD596d92500b9a763f4b862c511c17e0a47
SHA12fd441eb8685d15e14fa6405e82359adea3e7148
SHA25658829d135ff41e574ed5fc5e0421e4aa204267b02ca3ffaf08d8efb0a70fdd4c
SHA512a1014584f1f278160d579848fa188f627676aee819e9395517490b00e273db6f583d7ddd31af6e35c9d251021df7fb26c88512aaa1c865c2ee3ba60c0a2db49a
-
Filesize
44KB
MD5ecdd26049573614b6f41d8a102ffcf21
SHA15140c6cff5d596267a64df1559ac36c4e8f49e42
SHA256a3377520f2a95b8cc06bd30e493962c07f97eebf4661a69d03efb36b2ca515c5
SHA512933c181d7575f20480c8deadac3f3e9190081456169122216c72e7b9a04aa75612140fc37697098c7c20b77001a67966fa1661cdc9110c40634c944f833a65b1
-
Filesize
42KB
MD5f82ccf890c3ae14bfd7a263d07276e60
SHA16a915d6eb8c99d065e36a721d721d556b74bb377
SHA2566b07a4fd3039541e30c68a8c31c371cda2cea480787f95e0ddbca3cc2fbff0cc
SHA5124cbf9e6728e08de8d61f34b17bb20d92b6a699969edb9afa013fe962c8fd39238288adcd826134c9bca459904d8574a804c519daac6b301e0d38f68722c0359e
-
Filesize
42KB
MD5741211652c66a8a6790396e1875eefa9
SHA12ccd5653b5fc78bcc19f86b493cef11844ba7a0c
SHA256e0945deacdb6b75ff2587dea975774b9b800747e2ee3f3917e5b40ddb87eda10
SHA512b70f847d8ca8828c89bbb67b543950fbd514c733cf62b52ad7fc0dab7b2168fe56d1f21bef3210f5c7f563f72831455d870a5f9aa6c557f1e3543ef7329c42f9
-
Filesize
45KB
MD5dae64d49ee97339b7327b52c9f720848
SHA115f159c4808f9e4fe6a2f1a4a19faa5d84ac630b
SHA256e76400e62ae0ab31565e50b05d1001b775a91aa487a54dc90e53c0e103c717c2
SHA5129ae72e5a658aa0e1fb261d62ccef474cd42d9bec2b4a50f71925d131ffea22b8f60fb961772587ce71cb30a32da3b7986e7483ecea960a509e0450d3983c84b0
-
Filesize
37KB
MD5ca52cc49599bb6bda28c38aea1f9ec4e
SHA1494f166b530444f39bca27e2b9e10f27e34fc98a
SHA256f9f144aa2dc0de21b24c93f498a9b4a946b7da42819a776b3283a0bcae18544b
SHA51205e2d5711eef8f57737b2512de2e73744f17e0a34de0bfd2a06c9cc60a08ebadbafe38e30b66a2ede7fa61d5b9571adddcfbd7e1cafcee1ab2168a563d2d3f0d
-
Filesize
24.6MB
MD5020191ff3bd7c4031430e8077ebc9034
SHA1cd92c66db8b2305f9356ac31419e72ed794c9d88
SHA256da071e010e8518a308dfb17d3416b3bad4e803731c7f16ddc25cf25947c39eb1
SHA512caff71d2581bf4ada14527d0923bd79f357af4263fb647f998c383247ffc8798ae271c85166ce20655af08d4b3b2a1faa3aac212251e27d2b69a8417c8805961
-
\??\Volume{5cda2886-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{5a7d2ff0-8812-4c96-a374-692a0b092a78}_OnDiskSnapshotProp
Filesize6KB
MD550e8cb36154a06f2af1acc5487b0ee65
SHA1fd549c3750dd0ffe26576d815b8a596f869f88cd
SHA256bee2174f589da9530a0017e7d53cef92c1f7cfaddf5be6defaa758379d12ba39
SHA51278704ff548b82bff657dee0991722b5e98cd99817dfd40b980688186604ac2d83a9a74d1d8a3994f00b9e78cebceebc1894199ea716524d921785325ad16fd21