Analysis
-
max time kernel
316s -
max time network
327s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250313-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250313-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
01/04/2025, 05:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/mobile/folders/1B2OVD125j8babOW2t0lGM3a3CfUwe1GO
Resource
win10ltsc2021-20250313-en
General
-
Target
https://drive.google.com/drive/mobile/folders/1B2OVD125j8babOW2t0lGM3a3CfUwe1GO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2872 login.exe 1784 Topaz Video AI.exe -
Loads dropped DLL 20 IoCs
pid Process 732 MsiExec.exe 3916 MsiExec.exe 820 MsiExec.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe 1784 Topaz Video AI.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 136 4004 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\D: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\D: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 drive.google.com 4 drive.google.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Universal\ScrollBar.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Fusion\impl\qtquickcontrols2fusionstyleimplplugin.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\share\ffmpeg\examples\filtering_audio.c msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Universal\SplitView.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Material\ItemDelegate.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\share\man\man1\ffmpeg-utils.1 msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Material\impl\qtquickcontrols2materialstyleimplplugin.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\NativeStyle\controls\DefaultProgressBar.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Dialogs\quickimpl\qml\+Imagine\FileDialog.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\PageIndicator.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Templates\qtquicktemplates2plugin.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\share\doc\ffmpeg\general.html msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\share\doc\ffmpeg\ffmpeg-all.html msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQml\XmlListModel\plugins.qmltypes msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Material\ToolButton.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Windows\qtquickcontrols2windowsstyleplugin.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Windows\TextField.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\onnxruntime.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Imagine\impl\qmldir msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Dialogs\quickimpl\qml\FontDialog.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Universal\MenuItem.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\CheckDelegate.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Universal\impl\qtquickcontrols2universalstyleimplplugin.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\videoai.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Dialogs\qtquickdialogsplugin.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\ToolBar.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Universal\MenuBarItem.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Imagine\HorizontalHeaderView.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\TextArea.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\openvino_intel_gpu_plugin.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\HorizontalHeaderView.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Universal\impl\plugins.qmltypes msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\D3Dcompiler_47.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Windows\TextArea.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Fusion\MenuItem.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\Qt6QuickDialogs2Utils.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\openvino_intel_cpu_plugin.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Imagine\DialogButtonBox.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Material\impl\CursorDelegate.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\AbstractButton.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Imagine\Frame.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQml\WorkerScript\workerscriptplugin.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\libssl-1_1-x64.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Dialogs\qmldir msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\Qt6Svg.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Fusion\CheckDelegate.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\RangeSlider.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Layouts\qmldir msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Universal\impl\SwitchIndicator.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\qmltooling\qmldbg_profiler.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\NativeStyle\controls\DefaultTextArea.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Material\HorizontalHeaderView.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\share\man\man1\ffmpeg-formats.1 msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\MenuBar.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Fusion\Popup.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\ScrollView.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Fusion\VerticalHeaderView.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\RoundButton.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Dialogs\quickimpl\qml\FileDialogDelegate.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Universal\TabButton.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\sqldrivers\qsqlpsql.dll msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Imagine\CheckBox.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Imagine\ItemDelegate.qml msiexec.exe File created C:\Program Files\Topaz Labs LLC\Topaz Video AI\QtQuick\Controls\Basic\Slider.qml msiexec.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\msvcp140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\msvcp140_1.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\msvcp140_atomic_wait.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\vcruntime140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\vcruntime140_1.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\{3C53F022-1E76-4492-8146-4B10882E3475}\mainapp.exe msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\msvcp140_1.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\vccorlib140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\vccorlib140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\e5b1cbe.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2864.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\msvcp140_2.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\msvcp140_codecvt_ids.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\msvcp140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\e5b1cbc.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\concrt140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\concrt140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\msvcp140_atomic_wait.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\e5b1cbc.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{3C53F022-1E76-4492-8146-4B10882E3475} msiexec.exe File opened for modification C:\Windows\Installer\MSI3EBC.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\msvcp140_codecvt_ids.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\{3C53F022-1E76-4492-8146-4B10882E3475}\mainapp.exe msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\msvcp140_2.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\vcruntime140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\220F35C367E129441864B40188E24357\3.0.5\vcruntime140_1.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133879594119451054" chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\220F35C367E129441864B40188E24357 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\220F35C367E129441864B40188E24357\Complete msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\Version = "50331653" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\13CD821E8711F6B4086A161E2B55ACDE msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\SourceList\Net msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2366915068-2945093646-1682508031-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Children chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\ProductName = "Topaz Video AI" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\SourceList\Net\1 = "C:\\Users\\Admin\\Downloads\\Topaz AI download + settings\\Topaz_Video_AI_v3.0.5\\Setup\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\ProductIcon = "C:\\Windows\\Installer\\{3C53F022-1E76-4492-8146-4B10882E3475}\\mainapp.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\SourceList\Media\DiskPrompt = "Topaz Video AI Installer Package" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\SourceList\Media\1 = ";Installer Package" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\Language = "1033" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2366915068-2945093646-1682508031-1000_Classes\Local Settings chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366915068-2945093646-1682508031-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\DisplayName = "Chrome Sandbox" chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\13CD821E8711F6B4086A161E2B55ACDE\220F35C367E129441864B40188E24357 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\SourceList\PackageName = "TopazVideoAI-3.0.5.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\Downloads\\Topaz AI download + settings\\Topaz_Video_AI_v3.0.5\\Setup\\" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366915068-2945093646-1682508031-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Moniker = "cr.sb.odm3E4D1A088C1F6D498C84F3C86DE73CE49F82A104" chrome.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2366915068-2945093646-1682508031-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428 chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\220F35C367E129441864B40188E24357\VCRedist msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\PackageCode = "85C917DDAF5E48C4B9917D3ACDBBD0AD" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\220F35C367E129441864B40188E24357\InstanceType = "0" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 3960 msiexec.exe 3960 msiexec.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe Token: SeShutdownPrivilege 448 chrome.exe Token: SeCreatePagefilePrivilege 448 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe 448 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 448 wrote to memory of 4428 448 chrome.exe 83 PID 448 wrote to memory of 4428 448 chrome.exe 83 PID 448 wrote to memory of 3988 448 chrome.exe 84 PID 448 wrote to memory of 3988 448 chrome.exe 84 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 2652 448 chrome.exe 85 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 PID 448 wrote to memory of 3672 448 chrome.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/drive/mobile/folders/1B2OVD125j8babOW2t0lGM3a3CfUwe1GO1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffff850dcf8,0x7ffff850dd04,0x7ffff850dd102⤵PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1592,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2076 /prefetch:32⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2036,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2380,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2556 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4260,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4288 /prefetch:22⤵PID:4124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4264,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5224,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5588,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5616 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5624,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:4100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5632,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5636,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4792,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4344,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4308 /prefetch:82⤵PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5968,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5528,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4592,i,18409254383791625889,16248875609839229589,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4340 /prefetch:82⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2040
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:388
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap13666:160:7zEvent201381⤵PID:2128
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Topaz AI download + settings\" -an -ai#7zMap14614:192:7zEvent222391⤵PID:3308
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Topaz AI download + settings\Read first.txt1⤵PID:2032
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Topaz AI download + settings\" -an -ai#7zMap22298:192:7zEvent143671⤵PID:4284
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Topaz AI download + settings\Topaz_Video_AI_v3.0.5\Instructions! .txt1⤵PID:2300
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\Topaz AI download + settings\Topaz_Video_AI_v3.0.5\Setup\TopazVideoAI-3.0.5.msi"1⤵
- Blocklisted process makes network request
- Enumerates connected drives
PID:4004
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3960 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding E919BB83CBD9D9C5F4CB6FBD2F761F2F C2⤵
- Loads dropped DLL
PID:732
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EE792F12E625F605F2D1FDB1A3C608ED C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3916
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding DE61C600DD4892C449A09C781BEAC9B52⤵
- Loads dropped DLL
PID:820
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Topaz AI download + settings\Topaz_Video_AI_v3.0.5\Crack Fix\" -an -ai#7zMap8889:202:7zEvent112751⤵PID:876
-
C:\Users\Admin\Downloads\Topaz AI download + settings\Topaz_Video_AI_v3.0.5\Crack Fix\login.exe"C:\Users\Admin\Downloads\Topaz AI download + settings\Topaz_Video_AI_v3.0.5\Crack Fix\login.exe"1⤵
- Executes dropped EXE
PID:2872
-
C:\Program Files\Topaz Labs LLC\Topaz Video AI\Topaz Video AI.exe"C:\Program Files\Topaz Labs LLC\Topaz Video AI\Topaz Video AI.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1784 -
C:\Program Files\Topaz Labs LLC\Topaz Video AI\crashpad_handler.exe"C:/Program Files/Topaz Labs LLC/Topaz Video AI/crashpad_handler.exe" "--attachment=main.txt=C:/Users/Admin/AppData/Roaming/Topaz Labs LLC/Topaz Video AI/logs/2025-04-01-05-42-3-Main.tzlog" "--attachment=out.txt=C:/Users/Admin/AppData/Roaming/Topaz Labs LLC/Topaz Video AI/logs/2025-04-01-05-42-3-Out.tzlog" "--database=C:/Users/Admin/AppData/Local/Temp/Topaz Labs LLC/Topaz Video AI/Crashes/db" "--metrics-dir=C:/Users/Admin/AppData/Local/Temp/Topaz Labs LLC/Topaz Video AI/Crashes/db" --url=https://submit.backtrace.io/topazlabs/b060552e9793d86dec356a038dee056ebd3b4d539c702a0e5c8f3760d7a99f98/minidump "--annotation=appName=Topaz Video AI" --annotation=appVersion=3.0.5 --annotation=email=Unspecified --annotation=format=minidump --annotation=token=b060552e9793d86dec356a038dee056ebd3b4d539c702a0e5c8f3760d7a99f98 --initial-client-data=0x390,0x394,0x398,0x36c,0x3a0,0x7ff7163f4918,0x7ff7163f4930,0x7ff7163f49482⤵PID:640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5301c1e07823f39ad2fc4c85a3f494330
SHA1e9a0133179e94b4aaf0956833beef464d9bdc44b
SHA256db11ae83997903c65d3356a63b69dabc77d82663d05497b606453bd5880286ad
SHA5127c8122620f0cae002f5f2d780f8449591bed32369d7cd1c9f7e110cff5294153123833f502ad13bd444588d81dde4ec9f58a85ce94a5aebacfa5904505f1f776
-
Filesize
5.4MB
MD56a1148741f3f0e07eff37201d481b7d0
SHA120e673e5f23124956251637c3d2207ac140e21b4
SHA256a4aaabff8e4952aa0995d6fa314c2321b2252a0e517c85914a9af75261612401
SHA5123064c7040b19e5e240413205cff102dc91d4fdd9ac041d456ba14725000a960af1b74e7397ffc6efa621ec83c101143cd2edb7fe2f07a91b0c0b2c03d0e1fca3
-
Filesize
7.2MB
MD5c40442c7cf49b15136a49b655984d6bf
SHA1367097f166e4724a04d9c62a3c0aeac1b8de89c1
SHA25697452119a70faf83510d2139795062caee86dd0ef501f6b98c27fb14f6da64bc
SHA512fc5eb7b8ed57413f7f4102e607601987ad5eeedecbd89e117b24ce569a975c019808f2b3d3f1bcec59968c95041a64d9e8dcd2bea2d23aec037dbc79efddf17e
-
Filesize
1.4MB
MD5b3ede80457909c25262b71ae453e7408
SHA1a56cbeafd8f8511fe1dbedcf3b53af07d520eea9
SHA256b3046cbf3aa658acc87d624e9f1298aaad5185f74414a169e64d90c06119fcb8
SHA512163eda08d7edf2f6938ef4b1b6febbf0bf07acff80491baa953a8fcadf21f54ecd15f040e8f7afd4a852ba43157c79a98ec567c04fb25f50259e40ffcb7eba16
-
Filesize
4.2MB
MD5be1a124d661f00f0fd7196a3eb86810b
SHA19a6285abc7ff3ac502b2f7ae62e5eddd86504f6d
SHA25619141e82e1287a4082b91c1241b5c0cc7fe11d0da837a7c2c83c728a672b1568
SHA51252d0aa054ebd1d45d1a246c77910e3a93bf76885e5dbc6b685a7d3e73be1d9b4b47d28be43ff02041a28411fd9f71ffcd8522bd85b49b52aa24bc8d90be777ab
-
Filesize
654KB
MD5e11c6fdcc3f9ce14e36bb001603af267
SHA1d4546aafbc0ddce301ff4a8787afb5858728df36
SHA25613556874b84cdb25f82c827aa00264a2ced6707a665aa67b634980b5a0b00225
SHA5122715f13e44638bd539a4087cc7a2344665649ac271d64bb60e8689d772494c822f2a95534b649b93d7173955e09de5a1d65686cd43faaa445690495f39d17fa0
-
Filesize
4.8MB
MD56f2feb9f1e4a54a655125f73206d6974
SHA18647ce547f390db3d9b9d18782baff9a00fe9a54
SHA25686d67b234c9cd05d128b5d86b39e4068324179190a3b90a04e801a4a4a30d028
SHA512e019666f320c9c59e344ce234ca629048c5b9528b7dd62b6c8084c892eafc7edf9ddba60fa49588021e3e8e9ef61b56ca8d8cc96458df50c139b81e9120d31de
-
Filesize
5.7MB
MD5bf1007fe1beafc3fd4fd5b6340678d82
SHA1dc380efa95b200eb21eb25a0e9724bafa0fe5074
SHA256b670d78dd99d9ccad2122bb1f261e5ef1829a19de79f47660c4a6937ef806d27
SHA512c311d163333d5a40e0a9dc0e713f120426c34d5018fd3a4be39dbebb4ecbdf8eadc43bd89277a7a69efd7335832e3013f5109123fd6b12069ecf03b934a15ebf
-
Filesize
215B
MD52006d4b7d0da455aa4c7414653c0018a
SHA16685b8360b97799aa4d6b18789bf84a343e9e891
SHA256a96c7bf5832767bdc9d91e2290a3920aec3abfbf2e3814bce38b49483f16f84a
SHA512703804e6fab0cf44317b7292c547a1348e2e7395e4b71367c32c3b097bcfb3344d3296179bf4ba33a4c752ae58a3873af57d8cdef35a34564205356bb4e6fd84
-
Filesize
2.5MB
MD55168bfe62abbf5bd97902e055f8c4543
SHA1fbfd73fcb46abf0401be61b53b6ab3c8fc1266e5
SHA2564b10250db54c81856621327a59627bd76a3697bc3bf563f239cb6d912abef215
SHA51205eaa75ac7645511282c738b80e677fe001a32fa698dbe64a54b1701445e99f512d5a69526a316d65ad398fa994dc61a12669dc0200a9c1c3a1f7662ea1a41af
-
Filesize
23.6MB
MD55523d0ffa84e2408a3a12ed0a55ae20a
SHA1361479c4647fbf0f799410d5cf93e84f9fc759d1
SHA256ea54fd84a516dfc2b85b5f36bf930084a7492ee80a3e56ade404e99f94ed6559
SHA512c1e80f0e83d0d386ce75416fd1ebd717c7c3422d2d68046502c4feb410980a311ca2da9a947f697209796c5b24883c55335ec9ae01602843e59be6dadf4b1dac
-
Filesize
23.6MB
MD5eb747d8a9ac4c4d98ebd4eb74e7be5ce
SHA1673df2fc18047860fc112c423e816e9a0fa6e163
SHA256567d051d5e0b1342700ccf165d0fb9a5902a5d6feba0c8853e3a60bc3e782aeb
SHA51233d619d3053a89b07205e508dad245808d26648d5449d75705c8965bb36c1ee6916b249c85dc57e177b9fdcba42c3c0ef386fe217f0e4dc62d1f8c95a6de878a
-
Filesize
3.1MB
MD509ab83bcbb062156a5230c7bc4d551dd
SHA198307490c99e505c7aa6d693e9324b9adec260b1
SHA256b7cf1bef706620d6c16d15ddfae51974cfa7bde610568a42bc97dde625e4043b
SHA512522c1466f0acffcb01f43eeb1645b7e4e96b1232230d837e801546344e0bb7799c4a64c6540e0e797be335888eaa9f2690198366b48fcae61d1d640295aa270c
-
Filesize
1.5MB
MD5b1379390f56c2a34fdab7a3c87d0c592
SHA14810e645adb623974380bcd7f1e20879219b9664
SHA2560d669ea8cbc1e198b9b04082af7436d8c5daaa59af9e9e0fcf4bb122e9556ab2
SHA512905489b349e2df0a7895a1bcf4629b0bad7b3935b6a798dd1ceb4a87171094fe4f61de545e353521b0f1678ed2fa32a99f88c199f5ef21818ab30bb6bdc8a9e8
-
Filesize
23.6MB
MD58a2ce15eb7cd07a0eade7e0ddc4069bc
SHA148f4ece61576701e59a4edf812abd3fdcbb857fe
SHA2564f30b51ad1e2c25197983fa7ed734d074d3aaa6997d0433feb862d4339ed64cf
SHA51225f365221f4b94572533804c8c4d36268014ef32c64a6e1beaeb3f3abd9a6aad2a19426dbb94a99fb44bbb5690f7967b80464d0b1521dc42081237c0eebaed2b
-
Filesize
1.1MB
MD5c9b78a2d629db4cd15cf4ed9d0d61596
SHA1e8fd514806c6d266a00efe7ded4b1822e12f3255
SHA256ec1d34de8535bd475ac64fc4ab685fe37910bfa658dc0abbeb2d66b7ed51ebdb
SHA512fd31db175736a228ebdd3edcb9f0027a4c4539a7952886a91c647588a929f667bf5406c2254a793ff05c44d6168040db8c80ac6a1543ed1b9e757acba4f9e63c
-
Filesize
155KB
MD52ca20a6cb767fbf592942568783babc3
SHA14ccaeb66d3925ad53434c2b953bfd26fd70c9257
SHA2562e72985e7bc067f2af4e1c6c3054b1549114af18ccc485387a50bdd670a4d473
SHA5120ed149f3dfde0bce9d3da92f141f3416e03828e1c31e0de928b063c7c7449d53c36ed7805ff79b0701fcd2f9007c12915bfc9d046799967f2dad63763570383b
-
Filesize
18KB
MD503cb8bf548cf5cd92132d66d1e74b604
SHA1c3282596f6c15bb98a69e77579bdc22d8b3ba416
SHA25611f5118678363e1f06a53a9aaabf26f188621d754a24afbc3c818968fc347028
SHA512b601943f28ada3219ae69a804e9d00a2e59aadbc5cf6573c3c1912546cde850b8b81b63c8738560eab97ce28b1c0835524772810412f111d2dae4dec46fb4267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
Filesize471B
MD5072e329403c1fd4de11a63651d866833
SHA1cabc351df595fbadadd041a22f1db751d4684c31
SHA25683152651dae6008408f0760a1674006d74a6fa6b33ee91278a3a386d411dd547
SHA51268fe3505926f697902d97ad95457c4f40ec586f65a4af842ecb30bb0dd862542d72d6135c5759574ab08b4cacabc8cef57a41e509d63cb6dc9001f171c04452c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_622FF18A3B1CFCB8CC579FBC66AAEA0E
Filesize727B
MD5764861b9ff5b866ec2cf9c9d53649b74
SHA1c9842c9f83f0887c998b49ebe63b221ce55a856f
SHA2565dba28423dcf9218ffd0eab50e726e3b92292e605798ba999571eb3fe13b338d
SHA5126b22382f341b409cb048353b205f52dfd941a8b051973cd91cf53b77485b6cc775b464651f70adfc8a18e26bfd43629066facf5d86ea98217ab3cf6eed0bce73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize727B
MD5c4549343ad9027b4840f56e3f209775a
SHA11a5bebc865e915d2ebedb62997cd4d65b0ba029d
SHA256cf001cf291a32a0caa78ad3ee0867a92cfc7e1f25832d7b942368b2b89f192a2
SHA51231697d38a424cccff3baa641914fa3eb537a60299e32c3ee9857fa06103215333313fd64f64f02ea97393e5e9afaef89cbe66c17614bf54d1e1ac3ebaf47918f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
Filesize400B
MD510e47049f223c4050820fc0b25994845
SHA1e6074484b13636276bb8b1a10f0655f2407baa4d
SHA256e84e970cb27d816660e474016550d5d84570b2b6608026e04f060cbfda78548c
SHA5124459dbdcdd533f45169adbd1a0d465e0d0e34521b6996d3cb8285d9f541c68920e44a2246a3b201a83d48a2defb0c05dc5bb610f60c09c95a140768db76b72e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_622FF18A3B1CFCB8CC579FBC66AAEA0E
Filesize404B
MD53327f96a65144e0b50cd7ca7e3f2b4a5
SHA1e9af9ddc353f4d591c47c585a43dce876b5d493c
SHA256c62995a6b2fb2b29767ea603659771a7a6646b25684e45855294adfe57cda8ef
SHA512eb3586618375f66ec61e82c94eafda38fa9d935bf0d6b0e001459009cf38b38fc278eb927a1ff4646a3ce7e1a61ff2d172261b44e6be8eb447d65d25efafe759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize412B
MD560491afa94faf7c3fdadf844bcf281fb
SHA1a145e173ff10f281a2933d620f6c2cb59140c7ac
SHA256562898740a3ebca53e5f6887f74e64caf67cd77241d1891e7ec4dd337b630edd
SHA5126b8882939a4df752b6106a247424a791c930de81f466176a9f3e69140e0674e1b0b8d40bd86a8e4e183fd41d672d2afdfc1f56affcd180a2bf9104d749bf8c99
-
Filesize
649B
MD551df2e0ee7bbdeb947f661c5da8417f5
SHA18b504516f2c0f658fb3e52ab66782e134e392e47
SHA25613748e735758d4fd53382c868751dd2206845a744353289387356fb3fab15235
SHA51289a7f8fb4643c8dbf9e0130ddd2362e908edb0cd22171971966db7aa755f0a085c7e9375251d8baa3fcb04b7bb29acb686a0a4dff5d44a208d362ccb4da3481c
-
Filesize
216KB
MD550a7159ff34dea151d624f07e6cb1664
SHA1e13fe30db96dcee328efda5cc78757b6e5b9339c
SHA256e990d9d31c4c7d57dd4795e43baea05501fb6ea8b7760f89001be660425dd01b
SHA512a7768dd7e315b07754a305080e0fc023765e5a224b2c3824e8e10f29286df63bbdefef379e069941fd8cd9c7c3befce976779ae2efdfb6e7da697b09d7f07250
-
Filesize
1KB
MD55698173b87f2d385d50160eff6b64a9e
SHA1bc009e5be2c81065f8f7759a222fe0b5607d52da
SHA256b4b07a2afb1f9a38d1349129abc368122d88438fdd8f928971bb5529fda028ba
SHA5129dacad1d6db2df82d71fb95cb1caa66ec2b75ddc1a2367560f565e607aa8d458e0354673ae00e0176a54e3aec35322dc29dd3b4971294e42d1cde65734ba1f59
-
Filesize
6KB
MD5ea66a4f8f76087d87ce159bb8541ac33
SHA1405f1e9366c073048ac6cb04085db39c4bba3571
SHA256e11039e26dde409f7ed7a3f92c4c1b0cdf3a5127dfc4e0453c23a9d1262d91aa
SHA512a18b9be7c5d1c00529268ab7fd4aacd81b37ca67934bd0ea09bb3da9de610996a6f1f1ab0045506e9f66390fda6f027c5811ce9ceb678f038eea1b52f9112010
-
Filesize
7KB
MD5e79e8f7e287d3919474d4230cb5352dc
SHA12ba29b97bfcd7df8a2b04acb0ed76701bba98745
SHA256a44520e3b93f9d14d94e07a23bd8ee0bf5d026cfc4b41605279c919396c467ee
SHA51212a516cd7dd4ef19f889d8a03a15cf55c517fbe378eedc88a40926b4793027fb30b2f507504cf96b04129156b0edb8a64e3311433bee525f6d5c4e0bf8f2e38b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD5ea159cd1d873baf6f2d426f3bda0d917
SHA10e8301d377f2d564ecd116b375a9646b558d9348
SHA2564f38499b551bea88112b67b2aa642732943efc0a72aed163be26f0f93520e87a
SHA512fcefaf8b0793b87d17a7a3fe40febfe0eb6377ca1e0a8ed7e1d8acd1a0077b89a778180309aaa3a6c77dc75e5ed1b01c7ee704f5f51ea33cca10c3dd616e5587
-
Filesize
11KB
MD59d56571c8e889f061595be5c2b0229d1
SHA1f26780dd15cc6e276505f4f6c70eab7e2152f0fd
SHA256685084657e4cde5c5620f2c455d5dc32708c1f01e3a2fdb44e3018dc523d154b
SHA512ca701f498b909f5a9cf8ae513662e95d52dfebbebf2d9df57160195c11ae9a4b7b0a443e6e5b8f86b0e0a48ecefb37100b5dcd1e5960bd77d148f8681d3063a2
-
Filesize
11KB
MD5d1cf0019ac56628aeda49c4bec9962ec
SHA1b0cb1b5183997d06227b98bd33e4f17a1fe1ae4d
SHA256bc88f06b9128b37a975cf085cd01098a4c87f406544c48450999ec1012c84fd6
SHA5129dabf47e5a7af14b3a32f593011e57a2406a307ee7dc527b02c61274fc7893d80f1c02cc7fbfdee71195878bbf06a07d305d645c6caab595239ce0c17a2b1e24
-
Filesize
11KB
MD559f9061479c181958d0ef40e24f0c254
SHA11a329da658bc8636485316e01f0d34aac8ecc079
SHA256c59c25f1c4a381ae87ade9e722db20b90f40af10398928d6768bffd16665bba5
SHA512f81c62f7f11d7ef818fba5d1f1dd91e273a5c7a9980cf7466fa610332944ebb0011ce0721e4cb5ad2683848912e37f0ef81f7f2ccdb6bc82bcb58b3f16241980
-
Filesize
15KB
MD5e091281a33cdfea9f95a88a9d9fbd2fa
SHA141cdaea490db2b04e445e45faa4868c0e902168b
SHA2565e3dbd47355abf1a9f16d09c2dec04cfe2311201abfd0b33bbfa53afc53e0c9f
SHA51202ebd09368c0a0a3e99696b69b8ab8b3ae10714cafc19a70d26e1148159fd736841188958e4c1edc35621ad25a810288d2f195ab78e7454d2ec7ec0ad331b91a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5d0481f9a33db42c8e18b41bae6edea6f
SHA1d8e56667a396c12527672e6a265ab7d94e2c6f68
SHA256d6030d1f13d78bbdbeaa3a3c44872e17dc83133ada0dea86db02a3aad3e3393f
SHA512e1489af221448f395dbff7f289e5d1047b59391963a239b19e6e5dacc7650d3d62bcc7b3f5f2073dd38c2ae21c1ca1d0dd99e69584a5de715855f49894327011
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe580124.TMP
Filesize48B
MD5d451f51d79d745bc1a234f58bdd56953
SHA1a9f1c85910f0835e158b10ebb0fd2da4047e8053
SHA2565e9f71d25904aac416f1191e06ca95a1ba10cea3e337b71b64004932b30f33fd
SHA512e25d1f5c0f9eaf3f06ba0401effb7bc7826210d8e97e92784671d53b2f1c8af3c1ae57d44bc723bd9536903f19cde09a897d069927e2801b1f2940df6707feab
-
Filesize
80KB
MD5680170078573adec1081b7d099f1628d
SHA1e39b258839cc9185e8ce99ff2cc66b1916c3a8b8
SHA2567bdab4f3de3e16303bb38138edf1ac02e853cabfe3dcc2dd6120c33b3852d3c3
SHA5123e59e6d07b6b164e9b49dbefaa4f39830f989a410f70e028f00023d27a36d8700c71f1d243f88f6f3c86c85aef4e7121c679484f2386782d1959ede1764df1c1
-
Filesize
81KB
MD5600312492a7807a5002a55158c9f6fee
SHA142da4293382a9fe767a7edf61f31adf37a5a303a
SHA2565374677a9d3c07f7fc0b1dfda986e9857ca8a19c312afafd487f0b0bd026f32d
SHA5123dcd4470d8f933ca4c890909303da1d0366e125e99898d6a6684151cfa146a19ae83293434477bcd8ca418d35e9beca141bd03d9455d626d2c7762001f418064
-
Filesize
81KB
MD5675b4f75b135318ac3594831904f4c11
SHA194c7aa77644fe021a0856341a53899c5dc6e6eac
SHA2566cd1e081cd5497d2cbac25d1010b4c5abdbdb9e0daa4a742d9f7c7dc8f64f279
SHA512e316a9ffd8905ef67db7722b46ee2585f535889a59bdec9b3e608ed442f46b1e6f7c8b4c9ba1d123988ee1f4ea4aa5d03d20ae49914c26aa03a30cebabd07ad9
-
Filesize
81KB
MD50d5cca28d1f8bd4e0d488b711cc37d54
SHA176fc02067a9ed71432d4bd03d079b5840df5737c
SHA2560f3bfd15ccca47376a630e85baca37c394ea823c60cc423cd774dc4af4243b83
SHA512389ad1ef2f570235600ea1d75482f387a75ae3cf6c92e160963e2dd4fed55896eb7d493ecd1251c20b90dc0b6bd2977c3cc58ea371868448a1e417b8b0809bf0
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
1.0MB
MD51bb5afe18815f2ca0ef94be920211ca2
SHA14d662bb7f8d40f18deacc3cbb8258ad2fdc3ead7
SHA2560695edc556bab3ff8d47db39933b00ee36081b1ebc8dadb443895fb0c83e7389
SHA512a8bc7c763339c8047fbe7545e60c56f8123460d8e1a501b8ce47a66d8e1a26c949ef98dfe2b065405b013a91eff03cd6066db878881b8005c23af0cae0c1109b
-
Filesize
241B
MD5d9448c6add408944183cec55ced32ef8
SHA137f9f95aff58cc904b0bd8f221238a926e0f47be
SHA256e367f4428bc932ba57b35910fa64a708944900f8df406bcff091211aece97028
SHA512ac0452029e3262aa52f22d5a84d678424ca6428ee71c176b9d906f9ab4f121ca7108fb815482192757b75f396570edaa2fa56d31f3171a045c6606fb5e0680ff
-
Filesize
538KB
MD594d076b339d12bf146417634483bb58a
SHA172e600e87dbb2ff86fc44d6870f703d63ca2f0f6
SHA2563ec06dba3310631ce2c2bf567d360989973f2be7eef9a10f39065ab179f693d1
SHA51231b8ccd6c9fa5ed512d4d00a54f8e5838138926cae4b8c8a856ee1495ddd2e7c7be3b36a35d0d5cbd4cf8a37b75b929233c4f791a76aaa19cfc17654bc9fa6f8
-
Filesize
4KB
MD517ecf1d0a235427c5481879c00c79b7e
SHA1affad21cdbcbe0b49220109ceabcad9db2a3cc9a
SHA256f7d277f2fd97089eab7e05fb7691548a3d3d22e20aa66a6a27a92df17b44ba06
SHA512f02d40c671232c89a0166f0252d2cca082772fb3b494c100871084001c2e1960e0d66da783ef548c3747f5f204741e288f9018bdda1579b5a5a81c2db7c02bc8
-
C:\Users\Admin\Downloads\Topaz AI download + settings\Topaz_Video_AI_v3.0.5\Crack Fix\videoai.dll.BAK
Filesize474KB
MD522a0e56cc30079a7738d0566bea9c1ec
SHA15005076c350f97759e4ab3423318dd5399e6d32c
SHA2562fb1ca920cc3c73ece6776a3aaf10626d422b8b84092f62e771f906301762023
SHA5124be548e50a5517d1f24e78bd05bc80204d28def4375decf50304c250ca49a70b8a5bd3cd81edb305928ca956fd00bdcbe3d9b21aa9bf883ec6e6752f0915f7ee
-
Filesize
351B
MD523773b3a95bdb06a82f9714ef3cc47d2
SHA178e11bf06cd72a95abf38ec225e93991abafca8b
SHA256092fb28064a96464fdbe0de3060af3e9ad1e6cacfb984c4f0d18591c0cd75d1d
SHA5121b9108d6baccd858d2602e8519cff408cae900f304c9cf7b33228e81f5deae7175fc19682cdc71e3fb56513fb72efcd4fd418dc6bb26e2fb3f74f27ba26963b0