Analysis
-
max time kernel
77s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 01:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1348223092425625616/1353366241263222934/Fusion_Fornite.rar?ex=67e6aa08&is=67e55888&hm=010d8dd5421c59a9e595c445246c696e63f1f36592d0cc45a406d43f909a6f42&
Resource
win10v2004-20250314-en
General
-
Target
https://cdn.discordapp.com/attachments/1348223092425625616/1353366241263222934/Fusion_Fornite.rar?ex=67e6aa08&is=67e55888&hm=010d8dd5421c59a9e595c445246c696e63f1f36592d0cc45a406d43f909a6f42&
Malware Config
Signatures
-
pid Process 6124 powershell.exe 3956 powershell.exe 1220 powershell.exe 4448 powershell.exe 4204 powershell.exe 3828 powershell.exe 5148 powershell.exe 5372 powershell.exe 1456 powershell.exe 5204 powershell.exe 3220 powershell.exe 5872 powershell.exe 1292 powershell.exe 2452 powershell.exe 2812 powershell.exe -
Uses browser remote debugging 2 TTPs 7 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3984 msedge.exe 6180 chrome.exe 4764 chrome.exe 4756 chrome.exe 960 chrome.exe 5900 msedge.exe 2312 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation Stellarconquest.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 6164 cmd.exe 540 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 4920 Stellarconquest.exe 3812 Stellarconquest.exe 388 Stellarconquest.exe -
Loads dropped DLL 12 IoCs
pid Process 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 3812 Stellarconquest.exe 388 Stellarconquest.exe 3812 Stellarconquest.exe 3812 Stellarconquest.exe 3812 Stellarconquest.exe 3812 Stellarconquest.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 69 1764 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 95 raw.githubusercontent.com 96 raw.githubusercontent.com 99 raw.githubusercontent.com 87 raw.githubusercontent.com 91 raw.githubusercontent.com 98 raw.githubusercontent.com 86 raw.githubusercontent.com 92 raw.githubusercontent.com 94 raw.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 109 ipinfo.io 110 ipinfo.io -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4600 tasklist.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI2C7A.tmp msiexec.exe File created C:\Windows\Installer\e5825f2.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{6BC4FBE5-4625-422E-922E-C863AF6C82F9} msiexec.exe File created C:\Windows\Installer\e5825f4.msi msiexec.exe File opened for modification C:\Windows\Installer\e5825f2.msi msiexec.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 3460 cmd.exe 4372 netsh.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133875972208677070" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings OpenWith.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5652 chrome.exe 5652 chrome.exe 5888 msiexec.exe 5888 msiexec.exe 5652 chrome.exe 5652 chrome.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe 4920 Stellarconquest.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeRestorePrivilege 2716 7zG.exe Token: 35 2716 7zG.exe Token: SeSecurityPrivilege 2716 7zG.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeShutdownPrivilege 5652 chrome.exe Token: SeCreatePagefilePrivilege 5652 chrome.exe Token: SeSecurityPrivilege 2716 7zG.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 2716 7zG.exe 1764 msiexec.exe 1764 msiexec.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe 5652 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5976 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5652 wrote to memory of 3008 5652 chrome.exe 87 PID 5652 wrote to memory of 3008 5652 chrome.exe 87 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5776 5652 chrome.exe 89 PID 5652 wrote to memory of 5776 5652 chrome.exe 89 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 5532 5652 chrome.exe 88 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 PID 5652 wrote to memory of 2212 5652 chrome.exe 91 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1348223092425625616/1353366241263222934/Fusion_Fornite.rar?ex=67e6aa08&is=67e55888&hm=010d8dd5421c59a9e595c445246c696e63f1f36592d0cc45a406d43f909a6f42&1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffcf3edcf8,0x7fffcf3edd04,0x7fffcf3edd102⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2144,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:5532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1560,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:5776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2204,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2368 /prefetch:82⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:5548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4400,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4408 /prefetch:22⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5348,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4784,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5992 /prefetch:82⤵PID:988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6008,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6088,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5916 /prefetch:82⤵PID:6048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6032,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1724
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5952
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5976
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5716
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Fusion Fornite\" -ad -an -ai#7zMap13499:90:7zEvent315871⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2716
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\Fusion Fornite\FusionFornite.msi"1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:1764
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:5888 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:2164
-
-
C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe"C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4920 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"3⤵PID:4136
-
C:\Windows\system32\chcp.comchcp4⤵PID:540
-
-
-
C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe"C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\piastra" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1872 --field-trial-handle=1876,i,8905892830007782360,17946874554513921767,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3812
-
-
C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe"C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\piastra" --mojo-platform-channel-handle=2064 --field-trial-handle=1876,i,8905892830007782360,17946874554513921767,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
PID:388
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "wmic process where processid=4920 get ExecutablePath"3⤵PID:2112
-
C:\Windows\System32\Wbem\WMIC.exewmic process where processid=4920 get ExecutablePath4⤵PID:5220
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "NET SESSION"3⤵PID:1436
-
C:\Windows\system32\net.exeNET SESSION4⤵PID:4328
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 SESSION5⤵PID:3700
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"3⤵PID:2880
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Cryptography" /v MachineGuid4⤵PID:6108
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"3⤵PID:4484
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:3956
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:1220
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:1456
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:4448
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:5204
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:5148
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:3828
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:6124
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:2452
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:1292
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:4204
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:5872
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
PID:3220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""3⤵PID:6276
-
C:\Windows\system32\findstr.exefindstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"4⤵PID:5320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall""3⤵PID:2436
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall"4⤵PID:2224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall""3⤵PID:1812
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall"4⤵PID:6916
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip""3⤵PID:6932
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip"4⤵PID:5688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook""3⤵PID:6728
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook"4⤵PID:6968
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager""3⤵PID:5520
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager"4⤵PID:864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx""3⤵PID:6960
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx"4⤵PID:2352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime""3⤵PID:6964
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime"4⤵PID:6308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore""3⤵PID:6648
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore"4⤵PID:732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40""3⤵PID:1464
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40"4⤵PID:4112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data""3⤵PID:6584
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data"4⤵PID:1764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX""3⤵PID:7148
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX"4⤵PID:6084
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData""3⤵PID:6740
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData"4⤵PID:5300
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack""3⤵PID:2924
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack"4⤵PID:5012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Mozilla Firefox 135.0 (x64 en-US)""3⤵PID:6708
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Mozilla Firefox 135.0 (x64 en-US)"4⤵PID:2204
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MozillaMaintenanceService""3⤵PID:6912
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MozillaMaintenanceService"4⤵PID:4388
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2""3⤵PID:6420
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2"4⤵PID:4028
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ProPlusRetail - en-us""3⤵PID:1996
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ProPlusRetail - en-us"4⤵PID:1976
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent""3⤵PID:3460
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent"4⤵PID:6672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VLC media player""3⤵PID:1804
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VLC media player"4⤵PID:1224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC""3⤵PID:1064
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC"4⤵PID:3616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}""3⤵PID:6156
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}"4⤵PID:3568
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797}""3⤵PID:4836
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797}"4⤵PID:4528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}""3⤵PID:4636
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}"4⤵PID:6204
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{2BB73336-4F69-4141-9797-E9BD6FE3980A}""3⤵PID:3552
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{2BB73336-4F69-4141-9797-E9BD6FE3980A}"4⤵PID:5700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{37B8F9C7-03FB-3253-8781-2517C99D7C00}""3⤵PID:4140
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{37B8F9C7-03FB-3253-8781-2517C99D7C00}"4⤵PID:6488
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}""3⤵PID:6800
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}"4⤵PID:7016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}""3⤵PID:4048
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}"4⤵PID:6352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}""3⤵PID:3220
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}"4⤵PID:2232
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{64A3A4F4-B792-11D6-A78A-00B0D0180381}""3⤵PID:4592
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{64A3A4F4-B792-11D6-A78A-00B0D0180381}"4⤵PID:4492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{662A0088-6FCD-45DD-9EA7-68674058AED5}""3⤵PID:4620
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{662A0088-6FCD-45DD-9EA7-68674058AED5}"4⤵PID:4440
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6BC4FBE5-4625-422E-922E-C863AF6C82F9}""3⤵PID:3916
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6BC4FBE5-4625-422E-922E-C863AF6C82F9}"4⤵PID:4876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}""3⤵PID:4764
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}"4⤵PID:4852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3}""3⤵PID:4864
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3}"4⤵PID:5548
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{77924AE4-039E-4CA4-87B4-2F64180381F0}""3⤵PID:6536
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{77924AE4-039E-4CA4-87B4-2F64180381F0}"4⤵PID:6592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{79043ED0-7ED1-4227-A5E5-04C5594D21F7}""3⤵PID:6988
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{79043ED0-7ED1-4227-A5E5-04C5594D21F7}"4⤵PID:6516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-007E-0000-1000-0000000FF1CE}""3⤵PID:4160
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2224
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-007E-0000-1000-0000000FF1CE}"4⤵PID:4272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-1000-0000000FF1CE}""3⤵PID:6904
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-1000-0000000FF1CE}"4⤵PID:2112
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0409-1000-0000000FF1CE}""3⤵PID:6428
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0409-1000-0000000FF1CE}"4⤵PID:2744
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{9F51D16B-42E8-4A4A-8228-75045541A2AE}""3⤵PID:1432
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{9F51D16B-42E8-4A4A-8228-75045541A2AE}"4⤵PID:5348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{BCC2FB07-8CF0-4542-B10C-61BCEF04AFF2}""3⤵PID:5900
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{BCC2FB07-8CF0-4542-B10C-61BCEF04AFF2}"4⤵PID:6656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}""3⤵PID:536
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2352
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}"4⤵PID:4516
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CB0836EC-B072-368D-82B2-D3470BF95707}""3⤵PID:6956
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:6308
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CB0836EC-B072-368D-82B2-D3470BF95707}"4⤵PID:5252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}""3⤵PID:6984
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}"4⤵PID:1788
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}""3⤵PID:5720
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}"4⤵PID:5448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24}""3⤵PID:4280
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24}"4⤵PID:2196
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E634F316-BEB6-4FB3-A612-F7102F576165}""3⤵PID:2748
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E634F316-BEB6-4FB3-A612-F7102F576165}"4⤵PID:2452
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\XP7w0oheltJo_tezmp.ps1""3⤵PID:3068
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\XP7w0oheltJo_tezmp.ps1"4⤵
- Command and Scripting Interpreter: PowerShell
PID:5372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist /FO CSV /NH"3⤵PID:4944
-
C:\Windows\system32\tasklist.exetasklist /FO CSV /NH4⤵
- Enumerates processes with tasklist
PID:4600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "mullvad account get"3⤵PID:6680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell -Command "Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct | Format-List displayName, instanceGuid, pathToSignedProductExe, pathToSignedReportingExe, productState, timestamp""3⤵PID:6684
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct | Format-List displayName, instanceGuid, pathToSignedProductExe, pathToSignedReportingExe, productState, timestamp"4⤵
- Command and Scripting Interpreter: PowerShell
PID:2812
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"3⤵
- Clipboard Data
PID:6164 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Get-Clipboard4⤵
- Clipboard Data
PID:540
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "netsh wlan show profile"3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:3460 -
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:4372
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""3⤵PID:6528
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"4⤵PID:3956
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9222 --profile-directory=Default --window-position=-2400,-24003⤵
- Uses browser remote debugging
PID:6180 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffb79adcf8,0x7fffb79add04,0x7fffb79add104⤵PID:6352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1560,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2164 /prefetch:34⤵PID:5532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2136,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2132 /prefetch:24⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2364,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2340 /prefetch:84⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3240,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3312 /prefetch:14⤵
- Uses browser remote debugging
PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3332 /prefetch:14⤵
- Uses browser remote debugging
PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3532,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4404 /prefetch:14⤵
- Uses browser remote debugging
PID:960
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=9222 --profile-directory=Default --window-position=-2400,-24003⤵
- Uses browser remote debugging
PID:5900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7fffbd37f208,0x7fffbd37f214,0x7fffbd37f2204⤵PID:7080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1968,i,14866917634880097888,7624704180387689421,262144 --variations-seed-version --mojo-platform-channel-handle=2196 /prefetch:34⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2164,i,14866917634880097888,7624704180387689421,262144 --variations-seed-version --mojo-platform-channel-handle=2160 /prefetch:24⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2372,i,14866917634880097888,7624704180387689421,262144 --variations-seed-version --mojo-platform-channel-handle=2760 /prefetch:84⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3520,i,14866917634880097888,7624704180387689421,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:14⤵
- Uses browser remote debugging
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3528,i,14866917634880097888,7624704180387689421,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:14⤵
- Uses browser remote debugging
PID:2312
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2824
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:6524
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3428
-
C:\Windows\system32\BackgroundTaskHost.exe"C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider1⤵PID:5700
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5608a618c4fbdd378dbf3ce318da00b0c
SHA1cabb6d5e6e0d6dad6151a90bcdc71b33629ff9ff
SHA25634122d75a4706bbcb5fde21ec124cc8c7d2c05add7fbe80a1d4e9a4051fbe6c1
SHA512383df19aeefea043eb0723717dd7e7c7f1733559843afae498b16fa7d372fb2fa0a1f4ec862a8c76568d719a63096b941cee534c3b529ec651659920e62111c6
-
Filesize
40B
MD5d56cf9f768092279fa5b9e3247256148
SHA105b943e4043cbd5ec65762ffc0359e578c440ee3
SHA2568cbbc9983b60f07744442f8863f6148ded79f7cd8c654a84df6243ea27037722
SHA5121cd9641cbcc4dd04326afa94f9373f576a31f26c752747b8554b06ef0ebf16ba78462cbdba859d95e57e0217cd8e2e01904a280327b61f7f3daca292b4d3a663
-
Filesize
649B
MD591c88ac4e759904acdb970cd214ed2c2
SHA17f769e91b0acd9268352516d4e00556cbd673294
SHA2562afd028acbc41642ce63d23a57f37a351d78b1d24dfa9053231ac0d5f54d8be2
SHA512fcf0749028f5dddf524e483ce890b1cf0b5c88d84c574d9b53de1dc912085d6ea302e0a0c8c33f2be27870c2ed904fdc938009d0ab325fe75951faa33a436bdf
-
Filesize
332B
MD53dc802d5cb86f025fd26644d592f6468
SHA1d6887c8fc66b98b1913c343a4abbc5a2a1dd9539
SHA256f1a4a304944a51778ca07cc3c97b363d3ccd271966626d0354f4580e52b4a48c
SHA512a5efbfaf2e45917cddc2b1784c8e420037b015adc56d39962afe664495d30f5a25015e721eb875e21fc36e6ff2194ef69514a655624b9c87fca00b3dc3673d8c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD59b529970866e4991f2290860d303d646
SHA1a2c780a0bf5312da440b61639712a0c7e592c019
SHA256bb0dd7e1b7586aab4fbc72f00e27efa8269e4093993c2898b8bdd870681e5446
SHA5122a3bdd502df9575010fff52cb25e2cb94f7f10cac2b468aba5c39190ff6c28134949572f0fdc246af08318a9d5905cb8628045fe8e970a5904a1e9f4fc28dc38
-
Filesize
15KB
MD50e041b8beb62109bc612bd433aecbfbd
SHA115b0515597c527f32376c2faf6d7f4084d208ab8
SHA256749129b2c7e5e151a012ba92a99b29c216369146a1469915fb7d4eaa4c1700f2
SHA512f8581544274d402fb6345c08b1bc8972b9156218704e2bed646a61e2af28029072a8c9eab331475d60647b2648f827d93b6eee8d386acb3c1fa14c35678f5573
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5e26ea0943d705460cdf0c2c27e9f5c38
SHA14e47c21420fdb92fba0a67cee7b85adaffca0a7f
SHA25602741d84eab0b9e9faba5d12b039ac39e728435799961b7741c71381210ecfd4
SHA512f8e0ce1f13aaf0316176f2ff04373ff36f5933bb22951d25b23759a89f85660b6ab9d7456e2f3b9b0f52c2e784eb7e4681cb22f1b171625b08f5fed0ea43b100
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5796d1.TMP
Filesize48B
MD5137faf535d361d7b251a3f10de6b9131
SHA1210c7cc55026d066926adc7859ad44c4363de1e4
SHA256ffa063454e4b7909797590448ab9dd070f091322760bc39225005c63d5c23248
SHA512841456a8c1f66d5c7b58f80692cc624762a56a64aad17c8a66dfc2eea7656fd84a76514bc43d6e0a851fddfc35137f744779cac75d5297a19262f95588f9f1ab
-
Filesize
130KB
MD53c9efa6cde5d9ed28adc659e0f4ae1ad
SHA16a8c9882d722457f0d97ee2577a4745b1667ffba
SHA2568d60d95a3a752f1caad8879ad1df7e8c58aca1a2a55eca6872b10edfccdc1518
SHA512149bf3cf6717fd7bfb30a3dce1e70ad94748e692237cd61327377d6c79eaf4c58ccf5b40c64768906d3bd1819195dd7d8595974b5481cc286a1ddbf669140794
-
Filesize
81KB
MD5be8a508b86c6b32b7ae4c55963cd30c2
SHA1fb55e6db33ecd44e0121adaccf9a8344c7d5174e
SHA2564b5e089d41a4e81a06100f0da448fc228ec32b959666c43a1764e71b0cdd486b
SHA512a7f3854b17cd20ad5716b297858154465c5d66ae07b5d3edfa8f9ff53b3d97b9eb33bc85c81155cb02df0342d545eb3843fa7d680c1badf84976cf801b275ea8
-
Filesize
80KB
MD587d99461dfbbf9115ceea08a74f97e5f
SHA1cdff87cbaa8564eb826344759d4da5d7f302c92d
SHA256288e7b2fd882187c4eebc04f79551b70ddc4cfbedce03f5da70663a9b7a0a535
SHA51256be122cdc8f327c4a5a429b030b6e38197e9e835b57f1bbafe9a4b79d0ed185870e26f0d10828641148cda407f5325368f9c2603656fca2b108d627963e27d0
-
Filesize
82KB
MD58c9208f5fe54b62a7e8dade34407e38a
SHA15a09ef54a5e3b7f35d20d4d977245d2c446ad81d
SHA2563a3d966e62c891aeb285b8ebb848f1ffeedaa7f822d4d365a0efcc4ce454ca56
SHA512c85781bdeaf385b6729ca2187d4b666f3df4527dfc1827b54240bb9ad1b21e928751f9ac5b39e13a834555ee12043ee3b7776bbf989cb8f357dd03cf5b76473b
-
Filesize
81KB
MD5a89047445227f6e782b5f56336937aaa
SHA1f9d42e06b30ad4dfeb3c36d84f94529311f05906
SHA256ac69b008b75e3c7c56bdac92b4d2966fd94379adb488e2dcf8961b466668005a
SHA5128686ddde56b77ec59974d59cf91e468ffe6d5514f55c1824de45d25a48c3a0042455ca318e717f8a81a61d90e8a49660ad8a55670ce7be7b17a375f4d76339b5
-
Filesize
3KB
MD550c591ec2a1e49297738ea9f28e3ad23
SHA1137e36b4c7c40900138a6bcf8cf5a3cce4d142af
SHA2567648d785bda8cef95176c70711418cf3f18e065f7710f2ef467884b4887d8447
SHA51233b5fa32501855c2617a822a4e1a2c9b71f2cf27e1b896cf6e5a28473cfd5e6d126840ca1aa1f59ef32b0d0a82a2a95c94a9cc8b845367b61e65ec70d456deec
-
Filesize
280B
MD5df2d1721cd4e4eff7049314710dc7c11
SHA1f5aed0158b2c0a00302f743841188881d811637a
SHA256ba336ffd1b01965d7ab0e5fac5415e43cb594139c76b19e4c0d9b5b3b67c1e93
SHA51211fd520176193f284563c7d050e6a7ab4e9895bac49fdc05759bab2c8a69f224858ccc784b351fc1d3ee5d39345430f9234623c9390978d7daf6a08ff5576ef4
-
Filesize
2KB
MD51dbc7648169c010aa8a576588a806383
SHA1f0842317bdd058a7d87227c7077265b36bfd7f14
SHA25685d96facf9133d00d482ed7504e4e03fc45b3b1e5f19a138f2fcebac66436973
SHA512556ecd6de2ec7996d176a3728cc93d7c3cd60112fc3462417dffade33d0298f74d017f9c96758e90dbfbbfc7f8da53a5897f90dcf42d80aab400168b9590ce52
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize325B
MD568fbb26e419b57427d158160a337dd5c
SHA1d7a745b2a97b9c146de5df66fa89e5046467d267
SHA25673950272752530e79e76183c4f92c929b65785e481d268c6bd678b6a62485c4b
SHA512348dd1ee262cd66f88d5aec2b04974fa25cacaec336a2a9a98656e8192a81de5e4c9a0c301b529e8a34e3aa1a69bf1b51c625a22a95c3d457dd53c9a943c3cac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e9e7748d-80ab-4cff-b1af-59b13ecd6493.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
40KB
MD59c5e5e484c8e7f995e09ec7d2f4b799c
SHA12b9857d501ee6614379f50432d3631bdc7692da2
SHA256dfa4931294402f3972ec3c426246bd4cd29e3cf0b8491ee519abcdfed6bd5f5c
SHA512cb00089e699625752cf62b918c237fdf54a66d7f01450c8e7dee8f5f52f809e55ad2f499c07b2078cea95078d1da78b3ad6404423f701f4cb1d5d47c52ccc2d7
-
Filesize
2KB
MD528c65370f12e84b734af87ad491ea257
SHA1402d3a8203115f1365d48fa72daf0a56e14d8a08
SHA2564ea873fb3d77a2f8eefae82c943f621f16723516e181bde133568f8f0c91290c
SHA51256eb34162b0a39da4aaf66aad35ef355a7709982b5060792e3b4849c36650725176e927815537ec58e7ddf0fb1763066b203d6b7f9d1b3dd2c8bc091c0c850cc
-
Filesize
2KB
MD52f87410b0d834a14ceff69e18946d066
SHA1f2ec80550202d493db61806693439a57b76634f3
SHA2565422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65
SHA512a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4
-
Filesize
2KB
MD57a1e03fe1039bf494d77070f2c583626
SHA1bb6b31d644873fea13cb3c37e6225670b5682c8b
SHA25653bb6e31c2534c61d2bb23c0ef4d9550c1b9361610bd01ef1816a97297147ed2
SHA512e45c36ab8a4ba0c84783b2ddb2c26a9ab66cd5d26f1f0999b1288656288b1f8f33922a92c05641e6dfad03fac708525a1a37815d8ce1088ed0c72217e2f82827
-
Filesize
1KB
MD5bf4b73bd7b434e7564301a0b68cf80d2
SHA12b6713b96a19b2950ae10a7e59c30f44551de2b1
SHA256e0123cab6ad49f81dc16c0b03fb1801fdb18fc043971cb25b62c812c6bf9fa14
SHA512202b4f201aa139dc573c610f03ff04f26cbddc3ebcd5985f046306b7fe98c480014bed4629919e22099bb9ebf845fc3ff51f91378471c25c23a6ec06002378ab
-
Filesize
132KB
MD5a0e681fdd4613e0fff6fb8bf33a00ef1
SHA16789bacfe0b244ab6872bd3acc1e92030276011e
SHA25686f6b8ffa8788603a433d425a4bc3c4031e5d394762fd53257b0d4b1cfb2ffa2
SHA5126f6a1a8bfe3d33f3fa5f6134dac7cd8c017e38e5e2a75a93a958addbb17a601c5707d99a2af67e52c0a3d5206142209703701cd3fab44e0323a4553caee86196
-
Filesize
190KB
MD5c37bd7a6b677a37313b7ecc4ff01b6f5
SHA179db970c44347bd3566cefb6cabd1995e8e173df
SHA2568c1ae81d19fd6323a02eb460e075e2f25aba322bc7d46f2e6edb1c4600e6537a
SHA512a7b07133fa05593b102a0e5e5788b29488cb74656c5ee25de897c2ba2b2a7b05c0663ade74a003f7d6df2134d0b75f0ad25e15e9c9e0969e9453b7fc40b9f8bb
-
Filesize
4.7MB
MD52191e768cc2e19009dad20dc999135a3
SHA1f49a46ba0e954e657aaed1c9019a53d194272b6a
SHA2567353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d
SHA5125adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970
-
Filesize
2.8MB
MD514e00bf1d9d0df65f8b1a31240d474a8
SHA1f9fe033725b7b1b5c0efce7a14ed7ab223cb32e8
SHA2569d1eb0c6eb12bfa87e74a65c2fde5d61c4c93e21fb0800bbdccb6559527036a5
SHA512652724450296a739de802ba8fac482953146f37665718446e448a350295e1e7b09bd460835bcd0ac26b2e54bb9b791624a9eea11e6c96573c7c4aed22450ed14
-
Filesize
10.2MB
MD5e0f1ad85c0933ecce2e003a2c59ae726
SHA1a8539fc5a233558edfa264a34f7af6187c3f0d4f
SHA256f5170aa2b388d23bebf98784dd488a9bcb741470384a6a9a8d7a2638d768defb
SHA512714ed5ae44dfa4812081b8de42401197c235a4fa05206597f4c7b4170dd37e8360cc75d176399b735c9aec200f5b7d5c81c07b9ab58cbca8dc08861c6814fb28
-
Filesize
477KB
MD51dcf5ac3cb0dcda9c9679eeb018d01bd
SHA1bc21697c5665aab5eaaba61f55719d43328f7e7c
SHA2569cfc3001191e8b3eb9c96ba29e57e5bf9aaab264e83897e47cb968167a8a811b
SHA51247d8769bf00cc7555479542abf5e0684799e424d9801dad8c6bd199680d9c40cfa2380d969515db7a0753cf6f3a9733b5afb931fe33863fe30a37092d8dc96b1
-
Filesize
7.3MB
MD551378647d290f3a08affa8454a3d59d5
SHA132152a6677c82ea9e2e842baa907d708b46a6779
SHA25680c2ef6ca6d0ff4877bd0c0bc082ff19c3a5002d53648bcf5f54368560f9a411
SHA512ca90f5131d95fdb1e4a5cb7cb2bbef08676f70367b255270871754f776937994e34258084bf46437b25e1745728c279594d64e0718643eac0ac00cfc43d2c53b
-
Filesize
411KB
MD5626f30cfd9ad7b7c628c6a859e4013bd
SHA102e9a759c745a984b5f39223fab5be9b5ec3d5a7
SHA2560fd74bb69ad35b3f9391fa760bf0eb0ee73d2bea0066244577ef2abd269513de
SHA5129ce902f21fef70c5b5af444b532b36c9a00d896878cb4021c9b1dc07aa3277d956bca65ee0adb68467eec113e535b60a8a5fb5414c7d0ca761ceae5c43b7d9a9
-
Filesize
5.2MB
MD5e2088909e43552ad3e9cce053740185d
SHA124b23dd4cad49340d88b9cb34e54c3ca0eb0d27f
SHA256bba36d4d18d64d9627f54c54fd645c5ba459d25a59acc5228210bd707aef67fd
SHA512dcefacddec38d8941c7d2d7b971b6f22dd0acb4116e48891d1d48a4d88968da12b152ccb7591715c88f8e14c315e235d1c4e6852cc38b9246091c50226900de6
-
C:\Users\Admin\AppData\Local\Programs\piastra\resources\app.asar.unpacked\node_modules\ds-view\build\Release\DirectShowModule.node
Filesize276KB
MD58bd63caaa47cd503e9b17e26b2485a5b
SHA161f0ec58bbfe9f4995eb57ca0b3960553fa39a09
SHA256535e5f40bdbef7fdbbec49284f3682f4344f93c44aa159e70acaf8e3f5c11246
SHA5127ff9c2bbec0abb08fc3105b5b3ec47560472a9d45a28c0887fe42737957392fdd81fcec1683ef4fc945765c1ec42411f3594aa22b09b1833eb8132149dbf4f72
-
C:\Users\Admin\AppData\Local\Programs\piastra\resources\app.asar.unpacked\node_modules\pccompinfo\build\Release\addon.node
Filesize127KB
MD5ecb7d55aacccc2dd8b5d04e66063d32d
SHA11738607382b1b9942c386fc6d59ced4adce7b971
SHA256ad4aa384291c752cbdea2148b8365e0430bced22049c1e1c4d1fca82557d3d5d
SHA5126a111255791b734c37621e3b52d3a8909f77f6ba8d9cd87e64c38e2854534b81e106c0fc5427be1df8c5a1d8c238f03ab215be0a7202eaabdd77dc136d3ac6ea
-
C:\Users\Admin\AppData\Local\Programs\piastra\resources\app.asar.unpacked\node_modules\procid-listing\build\Release\addon.node
Filesize121KB
MD52698a47a4b2707b0579122293cbf1ad2
SHA18f5f5ad49b4173ee0d7e534de566b4e68aeeeaf4
SHA25630b3b22b35c845868eb333e10b6e6191cb0ecb7c25bfa9a0314dc5fa7a3dfb09
SHA51240053b8c6030bdf557c1ca284812f79f8e251e96a7180a823d7d2b1cc5ced5c605bb5ec7ca7292cf19891467059026b1c5e2b0b536c48f54787ee118b950f2d2
-
C:\Users\Admin\AppData\Local\Programs\piastra\resources\app.asar.unpacked\node_modules\sqlite3\lib\binding\napi-v6-win32-unknown-x64\node_sqlite3.node
Filesize1.8MB
MD53072b68e3c226aff39e6782d025f25a8
SHA1cf559196d74fa490ac8ce192db222c9f5c5a006a
SHA2567fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01
SHA51261ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61
-
C:\Users\Admin\AppData\Local\Programs\piastra\resources\app.asar.unpacked\node_modules\windcrypt\build\Release\windcrypt.node
Filesize154KB
MD58259356d73c497b875fc51c515773ffb
SHA1e910fad2235c62d5edc6ea181ecbb1424c22b86a
SHA256edd88ef51a1cbee6c622e97be67a7a925a72607ee6d47e4118ac5a193221c1c6
SHA5125a3ec9485e3e58a333c8ba442c26350fac7504910d20f8e1e247a67d915042148d1106e98cb058da37c1825a0befec0f57636846a5a36a12677f394ced5f4714
-
Filesize
611KB
MD51a37f6614ff8799b1c063bc83c157cc3
SHA18238b9295e1dde9de0d6fd20578e82703131a228
SHA2564fbe07f71b706c2a2948eba9a6b1979e23c83342b190723a6ec5251b2d6dad7c
SHA5126677f65a0e26fdc2cff6cef0231f5e5f0713ee7c5cf7f488599a3c7ac3e8365afaec10b35d6145ea58d364151d8bcb08308765693a9797ea99b894d6e8224ac7
-
Filesize
4.9MB
MD50b0658bf4f8cf397e1deddc50d67523f
SHA18fcf0726ee1272a3d5c65d50be1626f1b1f49477
SHA25694adcd97d1cdd459d21f0b5b57e0caf4c5c6e44f7bc6fc6a73f0bd133e8d551e
SHA512d745424644b66783dc8cf6dd043f27356f25afcda679ed43672fc0caf33c7339006f033e0fb392c865a5eb3e9f0e5edf37154e77121ba5a71893420da26b7cd5
-
Filesize
728B
MD551d3292084119377b00e5420c218e624
SHA182e555b675ee54cc522975d0d8a0c720feef436c
SHA256e21e8591091bd2462923b2b2b7507982772e0e4edbe647c955c9ba38e5b2c07f
SHA5126037e3aa997a59c0a09244ece01df2f17c1ac0f423cc7f11e3f160c4b9bb240582ae7a6e302f5b035b9aabdaec76dd6447bd48dd9898e8aed9c84ec6c2194237
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2KB
MD5baed441f6cb6d75f2ab80c13ea2578c2
SHA1b628b447ee53fad8e5a1ad863f0c61053805825b
SHA256aa4616809c55ba3f3c5cf7b17ca1e690c371bf0c0309d11a400fdece5a97a69b
SHA512bbf70c356597e444cc94216689aefdf7563dedd6e087352dc641106961cd89c830e3633c6af8603eb71b6c54757681ac35ffc3a58611255095983a1a432ce0d0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Stellarconquest.lnk~RFe58394b.TMP
Filesize2KB
MD51a61495a7b83bc4d543510da7d21989e
SHA18c30361b126ba2d11fe4c7a553b4a56bf885db66
SHA256ff93ec5eb97b6fe98cf00384dd5c057fab063ea18e1d4dffa1980190216e5cad
SHA512a9afce78cae82d3a31dcb73a33bd56a42eabbab0462a8123247db2c82b57411ac4409f07271ba3fe4691372d5647743feb49387c3eb3045cdd111b81afb06907
-
Filesize
5.0MB
MD5b658ce6e41b58e900d7eb710088ca582
SHA17b3479ed9820b66c95f3b268f0db1ecae9541b99
SHA2566c344d7a43b2276e920429884b1b7d732073c088d706d07beca61377c8ab0d26
SHA51257d937794c29b125a60482964216e27910ffd363ad5ba180b8375ca2cdbb4cacd571e1a3e63e0dba46dd7d99af0da3afe12f5095842a91568558b66ae0f822de
-
Filesize
24.1MB
MD577caee661c4161cefd9bc9a9410e3fe0
SHA12f7c9a7bbc455083202ae9f413f2a62706af8605
SHA25687b7cb1dc7544ff7f0451d304b5c193ea2e439add97782690724f08ac1793988
SHA51236758cab60272fad13dd50f507f45bea183130389d83d246fa5d8418ee1a2ecd4b968cf0835720ce3605dbd01df02bf6d24b32db2260ca7a9a1df9329a3049ab
-
\??\Volume{2c2b4495-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{266caafe-f53a-40bf-a423-14c3d9324f62}_OnDiskSnapshotProp
Filesize6KB
MD5ba679a266b84859ea60c371ecfb1dc06
SHA102c102317fb9dc03af3b27134f38391ee04633eb
SHA25667cdb11a00eca9fbc036419988f01b4aa661221babc832c7046b1b454d1569f9
SHA51290dc396d14d09441caac12a7e210e5549c637d78e3eed20fbaab526e1ea23b7febcf1e05670b5d61b02d8bcaf07740104ec1d1e305cea327b436c7007ee4216a