Resubmissions
01-07-2024 04:21
240701-ey6evawdma 301-07-2024 04:21
240701-eyyd8szakr 101-07-2024 04:20
240701-eyhzjswdkf 101-07-2024 04:07
240701-epw5tawbmb 801-07-2024 04:06
240701-eph8ysygnp 101-07-2024 04:06
240701-en9drawbke 301-07-2024 04:04
240701-em4rwawbjb 301-07-2024 04:03
240701-emtxnswarf 101-07-2024 04:03
240701-emkn1awarc 1Analysis
-
max time kernel
1799s -
max time network
1795s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
01-07-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
linux.sh
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
linux.sh
Resource
debian12-armhf-20240221-en
General
-
Target
linux.sh
-
Size
314B
-
MD5
c8eb421ad68efe174d0f7ef0c2e5a205
-
SHA1
0e769cb5d0be585be860140057f34b45ead449e5
-
SHA256
6730f5a35c9565db033f981866d13dbba63712cc56e9194cfe180f87480654a3
-
SHA512
ef76961a2a38b9a37112f38f9fe38860dd096b314343ac48acc3096565a55aef50dafc82335e3a1ef1e1505c6a2e1abc124ddfee40874d33f863ac6162afa6b1
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
unMiner.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Control Panel\International\Geo\Nation unMiner.exe -
Executes dropped EXE 7 IoCs
Processes:
unMiner.2.7.0-beta-mfi.exeunMiner.exeunMiner.exeunMiner.exeunMiner.exeunMiner.exexmrig.exepid process 1452 unMiner.2.7.0-beta-mfi.exe 340 unMiner.exe 372 unMiner.exe 1732 unMiner.exe 3488 unMiner.exe 5504 unMiner.exe 2712 xmrig.exe -
Loads dropped DLL 19 IoCs
Processes:
unMiner.2.7.0-beta-mfi.exeunMiner.exeunMiner.exeunMiner.exeunMiner.exeunMiner.exepid process 1452 unMiner.2.7.0-beta-mfi.exe 1452 unMiner.2.7.0-beta-mfi.exe 1452 unMiner.2.7.0-beta-mfi.exe 1452 unMiner.2.7.0-beta-mfi.exe 1452 unMiner.2.7.0-beta-mfi.exe 1452 unMiner.2.7.0-beta-mfi.exe 1452 unMiner.2.7.0-beta-mfi.exe 1452 unMiner.2.7.0-beta-mfi.exe 1452 unMiner.2.7.0-beta-mfi.exe 1452 unMiner.2.7.0-beta-mfi.exe 340 unMiner.exe 372 unMiner.exe 372 unMiner.exe 372 unMiner.exe 372 unMiner.exe 1732 unMiner.exe 3488 unMiner.exe 5504 unMiner.exe 5504 unMiner.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3312 powershell.exe 5012 powershell.exe 5048 powershell.exe 2500 powershell.exe 1116 powershell.exe 5236 powershell.exe 1780 powershell.exe 4324 powershell.exe 4852 powershell.exe 3484 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
unMiner.exereg.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString unMiner.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz unMiner.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 unMiner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz unMiner.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 unMiner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 unMiner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString unMiner.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exechrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
chrome.exechrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133642805074162459" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 308 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exeunMiner.2.7.0-beta-mfi.exetasklist.exeunMiner.exeunMiner.exechrome.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeunMiner.exepid process 3224 chrome.exe 3224 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 4132 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1452 unMiner.2.7.0-beta-mfi.exe 1452 unMiner.2.7.0-beta-mfi.exe 3220 tasklist.exe 3220 tasklist.exe 1732 unMiner.exe 1732 unMiner.exe 3488 unMiner.exe 3488 unMiner.exe 3216 chrome.exe 3216 chrome.exe 5012 powershell.exe 5012 powershell.exe 2500 powershell.exe 2500 powershell.exe 5012 powershell.exe 4324 powershell.exe 4324 powershell.exe 1116 powershell.exe 1116 powershell.exe 4852 powershell.exe 4852 powershell.exe 3312 powershell.exe 3312 powershell.exe 5048 powershell.exe 5048 powershell.exe 1116 powershell.exe 3312 powershell.exe 4852 powershell.exe 2500 powershell.exe 4324 powershell.exe 5048 powershell.exe 5012 powershell.exe 1116 powershell.exe 3312 powershell.exe 4324 powershell.exe 2500 powershell.exe 4852 powershell.exe 5048 powershell.exe 1780 powershell.exe 1780 powershell.exe 5236 powershell.exe 5236 powershell.exe 5236 powershell.exe 3484 powershell.exe 3484 powershell.exe 1780 powershell.exe 3484 powershell.exe 5236 powershell.exe 1780 powershell.exe 3484 powershell.exe 5504 unMiner.exe 5504 unMiner.exe 5504 unMiner.exe 5504 unMiner.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 5068 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
chrome.exechrome.exepid process 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exechrome.exedescription pid process Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe Token: SeShutdownPrivilege 1212 chrome.exe Token: SeCreatePagefilePrivilege 1212 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exechrome.exepid process 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe -
Suspicious use of SendNotifyMessage 53 IoCs
Processes:
chrome.exechrome.exeunMiner.exepid process 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 1212 chrome.exe 340 unMiner.exe 340 unMiner.exe 340 unMiner.exe 340 unMiner.exe 340 unMiner.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
Processes:
OpenWith.exepid process 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe 5068 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
OpenWith.exechrome.exedescription pid process target process PID 5068 wrote to memory of 308 5068 OpenWith.exe NOTEPAD.EXE PID 5068 wrote to memory of 308 5068 OpenWith.exe NOTEPAD.EXE PID 3224 wrote to memory of 4132 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4132 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4608 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4436 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 4436 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe PID 3224 wrote to memory of 1820 3224 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\linux.sh1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\linux.sh2⤵
- Opens file in notepad (likely ransom note)
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb4fae9758,0x7ffb4fae9768,0x7ffb4fae97782⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1816 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2132 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4372 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4620 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4552 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5016 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5044 --field-trial-handle=1864,i,16767921119371282945,12595470524056731372,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xdc,0xe0,0xe4,0xb8,0xe8,0x7ffb4fae9758,0x7ffb4fae9768,0x7ffb4fae97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1836 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4648 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4780 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5068 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5164 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3216 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3784 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3016 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5532 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1576 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3368 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5920 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6036 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3016 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\unMiner.2.7.0-beta-mfi.exe"C:\Users\Admin\Downloads\unMiner.2.7.0-beta-mfi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq unMiner.exe" | find "unMiner.exe"3⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "USERNAME eq Admin" /FI "IMAGENAME eq unMiner.exe"4⤵
- Enumerates processes with tasklist
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\find.exefind "unMiner.exe"4⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5572 --field-trial-handle=1884,i,18197491310708342634,748956889086961295,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Users\Admin\AppData\Local\Programs\unMiner\unMiner.exe"C:\Users\Admin\AppData\Local\Programs\unMiner\unMiner.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Programs\unMiner\unMiner.exe"C:\Users\Admin\AppData\Local\Programs\unMiner\unMiner.exe" --type=gpu-process --field-trial-handle=1524,3927539036311598507,1265670127206241724,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1532 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Programs\unMiner\unMiner.exe"C:\Users\Admin\AppData\Local\Programs\unMiner\unMiner.exe" --type=utility --field-trial-handle=1524,3927539036311598507,1265670127206241724,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1920 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Programs\unMiner\unMiner.exe"C:\Users\Admin\AppData\Local\Programs\unMiner\unMiner.exe" --type=renderer --field-trial-handle=1524,3927539036311598507,1265670127206241724,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --lang=en-US --app-user-model-id=electron.app.unMiner --app-path="C:\Users\Admin\AppData\Local\Programs\unMiner\resources\app.asar" --node-integration --no-sandbox --no-zygote --preload="C:\Users\Admin\AppData\Local\Programs\unMiner\resources\app.asar\dist\electron\static\ws.js" --enable-remote-module --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2056 /prefetch:12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "chcp"3⤵
-
C:\Windows\system32\chcp.comchcp4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "reg query "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0" /v FeatureSet"3⤵
-
C:\Windows\system32\reg.exereg query "HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0" /v FeatureSet4⤵
- Checks processor information in registry
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Programs\unMiner\resources\miners\win32\xmrig-6.21.3\xmrig.exeC:\Users\Admin\AppData\Local\Programs\unMiner\resources\miners\win32\xmrig-6.21.3\xmrig.exe -o stratum+tcp://rx.unmineable.com:3333 -k -u TRX:TYwuCAnaQfqkSPMhAuuQWuUPqPhrnHZTdF.unmineable_miner_zohwzmbr --no-color --http-port=60070 -a rx3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Programs\unMiner\unMiner.exe"C:\Users\Admin\AppData\Local\Programs\unMiner\unMiner.exe" --type=gpu-process --field-trial-handle=1524,3927539036311598507,1265670127206241724,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAEAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=2588 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\40881754-5e9f-42ab-b2d3-abc96e1a4fa2.tmpFilesize
137KB
MD52376a6b43822b93b493509db16847803
SHA18fbe62d26c177ee51e573832fc70b3d2cb7fdd22
SHA256b56fd9bd13d649ae1e91e614ddbb855e51ab32a9766b5d4bcc1fc476e0457a67
SHA51240eb0f01d7eae70482cd8ab3ba93fb91babe0f5932f868286cfd4aff000ebf06d91a9007a6cfcf0421ad611a02b4a7d8ac38914bf7a06d8fcd199b7bc542ddab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\CrashpadMetrics-active.pmaFilesize
1024KB
MD56859aa94340ff44ab7654e291173b6f4
SHA10b3794372f8eb0b320129392edc822ace3c29c98
SHA256a6505c0380e442e7fc0db2f3d8fdc422183fa810992d322d007d9302f210e6cf
SHA512c7e2b9a4c3c901c0f837289ed449f22f938175cc9c3960488e48b7c333b00e15e168cfab203f61feb0196414e00908384ccf453a4e22ee39f928f6e5b4463ea3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\metadataFilesize
130B
MD551ec8690c17b8d9c6db6b516ae85d0a2
SHA16e3b1ee369f65e86f401d3cc30039ef2cbaa6443
SHA256795bca3b32c15ba7bf3b14c0f3fbaf2ea6ebdd1b0c18272b67e6e6d160a08f27
SHA512b4b4db3c2fe62d29d42b186e9d4e71091074f06176fca2bf1d70c3403f3887877fae1dce570b427c57038a37a9af2959dd3763e26d03c3d6ab6f1bd4937e39c8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\reports\90629b8e-7a32-44dc-bb8e-831b8b67a83f.dmpFilesize
1.1MB
MD567fdaba2ee78d2218c8b1f8972de4634
SHA198057565d1b4f7fcb93cba8c586e435fb8de8f06
SHA256e35c8592ce2848f67d539909301b84f068cced25528f86429c15529c48e635ed
SHA512a29f6bd425b37bfe1c24e97cd0243a6be6f88db932be670b87a93b134b14e0a112ece65ca6363f279b9ed9f3d7a443f8be14c1669d6db398c674ecc81717de8f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD5acdad9483d3f27ed7e86c7f0116d8ad9
SHA1dd2cfd176ad33d12ba7e6d260e1069b1dd4490c4
SHA256bff5b4fff4b34ed3ea2754985b5ba1a8d6921517b0fa370f71f37ee0845552ba
SHA5126e3ab4b6cfa73a7ad3c36fa621b1d2817b26e8e3613b78a40df6691d65e1486e6c2281efa0f8d3f30d2c6647b7ba3430a8be77df770f1cc575e8db76be6836a2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datFilesize
40B
MD58213d502ed1353217e58aef4be651866
SHA1292ad825156c3446b2982add1e38c07610dbff2f
SHA256f87b012361767a95597327d06a62a496cddc43a690f7c9209cdd27f47fe91b7b
SHA5123c806778b7a6df8ef0c6807f7e4969f7e8fd395aca6665004024603be341cf6a78b54830ed0dcecf19bc3b23be5adceb0248b87d93354ee95b19bd39a3f6877e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0Filesize
44KB
MD5625c80cf2d05f18473a235c31b4aa3f9
SHA1dc2b68c31cffaa060e96660217686a4a5bb36509
SHA256ce214958412fc741428cb24d74f2eb543c7fc00997ab25a78e012f0ca45af1b2
SHA512b4d1d15f06f6825dc41459362e3a61d3ee862db6cb73752257b51a6c26faa2d3f7785ecffb2d78df5312603165d0b3821c99c4ad01b7e1d3bf5864d84862d739
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1Filesize
264KB
MD505702d9cf6c3a5bc19ab2fdcd38b61c8
SHA1495a316bcff0890a349423569291eaf64e99245b
SHA2566c61ad03ae08416e8b919ea9fe791ae360d028378e2b637b1d61b37f20013b2e
SHA512d0950f4cbf028b81983f882a8f238a4a410b6fe2fcffdb336901765c72926ddfc084427d9fb9805422488ff5aee2098604da68860227b058f0a1d2b6de61022a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_2Filesize
1.0MB
MD5011e4aca502eff80e9b69ba422e1dc72
SHA1be09cade14d8ebb3a8f5e7f0bace2efac4c75dba
SHA256da52c160a1e6e0d2a6a3be6c40de0359229d3ff38cddf01723c635c38874ed95
SHA5129ace6cc51c9eade6f8dc516043ab0a20c05c80e7f2166dec86d07b1a341ec011a966ed8613890d33e807d3955f6b21fa4b139f287e9016e199ed6377e533c554
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3Filesize
4.0MB
MD52596f39db3a8d45b556c8b142447562b
SHA12bc17c4c8369b13475a5eb03fb797a59b75a4b51
SHA2563d9f3b1cd18f221780cc23d3e033a939352e231df07d1556ce1be76ee840d6ee
SHA5121d1cd84e3f78c26a2ab5a4e391c76931ca7a225cc56feadb67058985045c004f3d2b0ae01479d6899c304c43065db9858c9a0ff6e5014b2474c19eb84da47802
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001Filesize
35KB
MD50f07cf3662cdba96b6f90f4b175f531d
SHA1e1edcd80b14647b9966200ecfc93aea24c11d571
SHA25655a4cc145d6090888b55bb3117a2914b57754557ab1220098e270659958c56ac
SHA51207286c97fcf115ba25dcbbfe18ba41159f43d1a9075a16ec5adc03dc2ed6b2fc4fc45a2787fa3ec9a69e568993b872de8210ef433e344ffb8ec483b0141a9f15
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000002Filesize
59KB
MD51d5f57b36984d3bc13513937212f7c85
SHA16962d480bc6216080b90505c9f25c8a3ed4c8df0
SHA2567c5544c2101aa4a9ab3bd0ed98d6d1126457f802c8073333d2e7fb7be273dc30
SHA512dcb01342a2eb9ff3ed03a23b7e0914ccb626e1136c2a24dc4e8144cd785c90acdbffc877408a922519055f0a375b4a31172e3120744de656d55dcd83b84a4f4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000003Filesize
41KB
MD5cfd2fdfedddc08d2932df2d665e36745
SHA1b3ddd2ea3ff672a4f0babe49ed656b33800e79d0
SHA256576cff014b4dea0ff3a0c7a4044503b758bceb6a30c2678a1177446f456a4536
SHA512394c2f25b002b77fd5c12a4872fd669a0ef10c663b2803eb66e2cdaee48ca386e1f76fe552200535c30b05b7f21091a472a50271cd9620131dfb2317276dbe6c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000016Filesize
98KB
MD50d5a212d8c2029a60cce8178d6437482
SHA1b8335dab89c63fc4526a2c1225528a0190205366
SHA2568359279a768d7f7b0b9590d3a4754e33c2a3816163a40b58f6d4ce6bcaac2b5b
SHA512d32935dbb809586cd01f7cdc3887fc003cf9801747f6ecd59d31b4a377cbb05687db29e6f73982765a3ca41ca5d37aa926b103e85f24fd60a4063851dffa9254
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
384B
MD5c09e4e4abceac1050190edd17a4b720c
SHA1dd4e2d206d060542329fecb6f6b4467ec979f344
SHA256e0b5a7a5462f99848e6eff4911e6108df8a869c3b2512339a90a45f2e626cc1b
SHA512c1dc79d1a94b929dc6900e59c557bfb2c58c797685542f572c2b6168e5fbc38cb5a431dcb1defe9e33384b4ef364f551c78b04b7eea3b3177bb5e16e3a789f6a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOGFilesize
317B
MD54d407992ae0f80f27f7c9053aec01250
SHA1013eb454a6789c154d38932780469bb724e23987
SHA2568fca068c46d13eeed0437cd17a06c225d8cbc1d11e00dc100a4c73cfe27cca9b
SHA51281702f715a8f64d7f307bb613e75086adf59389b1b0ebb024874e8ee0121bbe15c0eab6c591c81e1313a3160f2ea5764cba6599977bd00483f70fe5df46c1b4e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\LOGFilesize
327B
MD5eaacff34d5a597e3034ab98868b8a4a5
SHA1dc893d3ae5a28dc8005b13e21c7f022467321011
SHA256980296af825ca0a387d4fee5a700de9a14f6ec52c1f5d8acafaa7d8430e6ce58
SHA51293449e7714900a0c62f4c3a79f3738fdeb251ae6d0c9aee27aa3029cccd642fdb944355531bc7fcb41176b6255f5f9d81bdfe054cd88d23300bcb0ef7449d383
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGFilesize
329B
MD5157b8c219f40042cb7dc39feb7255c48
SHA1efd38152e8eec4ee96f8812d1df4474cf2d5b7e6
SHA256c934a49b2987dabd6c80a263412058b3d365ac0be4e1e9a67f7a689d22cd3544
SHA512d4a7f6a224b6563c8b83761b5c226f694d058318b311de09e9cdd6cf104923d34016aae2e37ed35ed62bc5704bf42b64af85eef486ec1ac37024e73539216248
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD5a3e4e45b262460250a86a266d3f1fad7
SHA119c3ab27c2c7b762546065ba1b55ee4958f45838
SHA256388fc2c276a155dbe020892eadea676149ef9d0ac55724bff004ef4374cd8631
SHA5122712106208c4070fc227365f38012a8e1ba424bfb0788b86aa53800c9932286d0bc7cc9827be74a06706af6f01d262a93e8f427081cb3c80f6e54c3c98175bab
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD52ad407b3f947b01aa1a736813b1a3b8c
SHA1e7269330fc1b819012e298c6ed300f9619ef50f1
SHA256ab68c37f656ae8f9fd455dfa63b89a8f38b287dc10d5a0ba14b1527ebf470409
SHA512e24d4ff8c0e74bb30329e8e019e351eeb62f37bb2de7b937b082e46c962a3e8ec97fb4a6bc1a48ce421ab910d652304044e58e73e80419c4c951c88bb8dae380
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD58622af7ced9ab91f980ad16590c7d5a7
SHA1f7e41aa1a078f6ecc589de859bd557b5fd57412f
SHA2562c0b6399175f317e5a117c04f4b041cd3a4322c8688271e52b0fca3e503bdd42
SHA5125657c3fcfa2de3649ea586dafc1971ad5de50bd001f79864adadb50a5896f45f8b5cfec42f3ec3b7b3572a982d4c0dc4883df4aaf429c26441d4b03ca2e2df9f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
371B
MD54ccbdfed9d68c064fefac5315091e9b4
SHA12b87f3e06f502a6d6b2516a7aab556df46e4955d
SHA25675bf031745227dd14b9360807ec07dfb95a8cf324a61b0f7cef3deb02f80b52d
SHA5121c66138313108de84cd28e6f649ef6e5cc88e28f11703d6068640acf32bc3d7e5baadf9d198eae5555cb879f43bdd7e27a41a79e363101047d7332167c286438
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
371B
MD53ae693a494f6501c7ac7594ebde8976c
SHA1f1346e35a24b8699bc6a1adfbf8f519bc6073b78
SHA25662b350eaf0f4019a3ca053305042c714d740b0a37588fde0a023e129fa783799
SHA512d4a175bd9dbf9df1c6709d8dfbf37690321b72e995aaffdfd8002d47f83eeb13e39f8ec0630393f8594e20cc19c75baf4c906eb4649f460aa5d6346fb5b483e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD59f3c196c9d5debf7d15eec6e24094718
SHA188d769657e06cf74bfeaa5ee754bdc0263dde51a
SHA256ae0153516d95fb7a2a7059b14b2ed035635c026dfdd89ce435b4868a49772495
SHA5127e5ac401e8088f712314cbef51f54840077e66a4a51e3c2d60fb5024f07eb5f22b41449e1fb7b7b729b0775cb8fd3719b43586d78d5bd814523952c2c4e1a08d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5dba0f2316129cf8530a4dfec1bdd2c8b
SHA16421ef5ab339c8ec93b164c1f222d523dfcbd1b7
SHA2562c25d7f2faf360a4e3bfb5ece4fd5c8f2868b01083850a6f41dd4356143fe911
SHA512ebd890ec80f1440af701ee78f413e131917d2fde763635b1667e0c721bf76af368585afcb8c4dac7c2a3ca53f6a49af45eb254b9369e759637d2089d4ac26ea7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5eced4f132a9b95b76417837700cab50c
SHA1987d13fd3d0d3adbef5b517983ade96d31cb9285
SHA256265b2b7c00bd2733c1f52992509ea20c698c135f035e076ea84fe86c20d71bcb
SHA512c85629aace70aa1188e2d5b5d579be187587486792db23948b650d60d543ec901d98dfadb2ea8d85b1a40ee31761b798d5be0996045969633866c0b5e596bc9a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5431716ad9f5845377d17e1c80b7fd150
SHA14790fba6fb073e4f9ff21cf1a9ccc5700581595b
SHA25603439fd120b0a3ecd089627f4aa833083aa81953ef850b84125e65b88deaa251
SHA512f093c951629fc3375c11aeb6431c44f12d2b66b647f43e31db904516749c1720ff79c4bd387880b418056b12c4c26479c5a800dd22c64c487c36e2f56e1d90aa
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD56a3151d3f3346c26d8b78f75c2919e1e
SHA1acf6b9b84434c55d36d2b1962437961f45c6d347
SHA2567cdaeaa0778a1436789e81a5f237fd8fdce7162b81b9258f717aafde938019fe
SHA512d586698a1125c086909b9fb17fa5e40c53697e7300e8aa7fe420c261d7fe056973e47d073634412302c6ab093ebcad3b7dd874b7f3c3798f7b209f9639017f68
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5563bdc83b007d03854ef7a303902cd98
SHA1c96f079e616f4115989667ecdfc9e9ca9ca51da6
SHA256932f573b4f0d41e6b09276f2340549ef5c349fb788ea5f17e06a40d6fbafafa5
SHA5122f41c06c67537ea975e5d6508e68da4d2c7b70b895aeaf4496f1eceac0adf325b00fe7df39b38bab3a60b057e101e0254f67466d4e12ea7cbd0139ddaa29ffcb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5954c28311f97b48292dd05963f8b6412
SHA1c8d30e0eae0c6771e170042f8d94eaab1ca11ac6
SHA256ec07c21e075000eade577b880f2933c2ddb045d547ad2f995ede1f62b5a13829
SHA512b1e6e9216e319546903693a469bdc32210ba4eaec9bc4bcc8e75370f2ac85c324fff5b332cce320c87b09f348b722075a8ca1e9e7c6d2213db40e48364b507e5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.logFilesize
213B
MD5046cc08d163fc4578cd1b77a5d0965ac
SHA192f503e605c30974baf385f1619f1269b81dec57
SHA256693a60684aa9ff4f01cb6027e9c938f4701c0c898afc224a0776cb1e18e87166
SHA512e8b1df36a237bcbbad897146ca247edf75466b2a4030fec620c46932b5c31137f2931cd2758534e4308aed3fb9cc40edf2d7646a38530bcc5e6d7069c19a3b1f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOGFilesize
317B
MD5f9d440be18190ba3a877a8328c544b67
SHA1c96b182c5fc6218102d3758bafb4398dc491e798
SHA2563a2457448804f70fe4344ccff81d82aadbe781e535af9071fd8b90b48acfde0f
SHA5126481437539e21d5c65f7ec9b0b06cd5b0edff65b9a519a24419a1a88b25ec43b7314a4796081de992301daed7b57e0c4dc031095c7c4a5ea4b953e28c9e6d055
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sessions\Session_13364280506689376Filesize
2KB
MD55c7eebf7cb646cff3618a66555b74c97
SHA1f427ed7204f494a5bd890678748da93b8bd0b957
SHA2569a7348296c40490c1e158878c59a4b3d6bad0c1b8eb1ba497ec32de576002091
SHA512144755793b7cd0e7ea0ea136fe2c2bba0dfb4f46d1f487c931816670d66e7eb86687b0d9c8a9255404fdcc622b9737742e8acf2f16d204bd7e1dbbdf1f0a349d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOGFilesize
345B
MD595d266cc9538860a0ac26174caa35931
SHA1a0490cf7706f902a6cfbc94dd7b434f224694059
SHA25690ba824574587c7cb11bd3a50559a12b1e27afe467b3a530d08458c0ee147c0b
SHA51237d29821abf8b6ad80b054ec921bece6cbb907877a48e5527419e94938b9608ac8a40c71215e17740b65646c2a48ee5b17849abc87b3c5fc482dd0e17cd3b391
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000003.logFilesize
8KB
MD5578724549bb2076484135b84ff0ab9f7
SHA1da489e8912554593eb21f6ac2746fa3872bf79d8
SHA2563c090e94a79c558555c953ab004be03f58143814e8b59ae79613f9c68e67220d
SHA5129818ed23a21dda0a6dd24997a6d59f9b1bbd2c0d82a1eb4203db50a3249ff0d5f4c36bc7244184ec3a2ad022a9ed2de499d18ffcd357e298d745bf1ae3bf7442
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOGFilesize
324B
MD576f11802537822c0e9b82bee7db78ae8
SHA1ed6c08bcc01ae7c36fbaf29245fa274408f6a088
SHA256b26721062798a9021af518fbef0ccfd8a2ebcb01671c367fe0f4f09e14580bcc
SHA512f53161bf42f60ae4fd117f3ba9d4241c0fea7bf51442d6b4b1c6cd92ea6d8d2ba4a983bd259614082fc6eb2272ca310a8aecd75909cf5d079676e3e8b71d205a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\baa2b4ea-a6ac-4bf0-afc9-ebe10021582a.tmpFilesize
6KB
MD5b08c7547bcea101b24c29dc9c044d7f5
SHA1310bc23f8ec4f021c572867e668268f64c9736b3
SHA256f5ec851bdec016f56a9bcf1c293d0d198d5a56f5e38cc55f41ef4e2c511b4561
SHA512bf19a16ab94ecde15924d1634687d3f0155f48a557aa9296337780f7d880dd1f7120f7033af1d59a56daf8449dc98deb1859cbec1826450d4969566e69ff3881
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.logFilesize
939B
MD5b5db984be6451e6a6f8d413c97d791a2
SHA106e062d01826f84dae0eb8b2ea70913d33e67392
SHA2567ed5062cabde69a8880522193749a2a33a0284fcd13362cdfb7c3ce7926ff93c
SHA5127860ae99443a05fdb49d6a6bcfe50f471dbf911b6eec47da0e08fc3a655eb43795d114eaf845fa1fe7084e0cdd6df93f8a39d6cad53e4b26601b75e7fad5bc5f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOGFilesize
320B
MD54025a9b91162aa2700e1fdee05c4bc01
SHA18e4439394e8e84d9833d5fc57a82c66ad3669288
SHA25670c940935b642c9810be6e36e4dd29987f901c93321446e31e48e30a6dbabfe0
SHA51217a30486e51137f8ab1a03ca0197c8aec0f58d14f8799b63cc3485a7cbbeb97e3aa8ff179bb8e5c2f652fd7864dbe479448dc62af7e4d85317ebaafc3dbbe9b7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.logFilesize
918B
MD59f0ca9cc035b6fbbe33d15ddc36afc96
SHA13464e499305d4af72732d8548c6ce479c90c3884
SHA256368cc5a43f1c15b935f384883db88f2cf6eb89d49f543428f4ec52cf914a1bd6
SHA512c6e46948bec2faa5e71036c2279ebc314da8388e1ce71992bf3f9052b2ced5afa7ee06533e165f13eddf9203515915a858fe70c1e7e4f514b88ea107c018b1c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOGFilesize
338B
MD5ee8fd03e6f47aa19ac0c1e407481b516
SHA15d322d00ad385f7369e22eb5e9b220d2bc6c0287
SHA256e52f2440412787ca14efb2115fab0e084c1890d5f52a5b0316d80a7146e5e2c5
SHA51265d66f95e3f469ed1ff51b24e2be37b2588145e29babdce9cfe601c7e75e035e7390dd2c7fd95aec44485e7768355ffb1c64e550bbd4af6c3c498491948f9930
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0Filesize
44KB
MD57617ca139660ed72a1020dad08048e05
SHA1c985fe999596566b3a77fd74c74558bb9e030833
SHA256bd84b1175f4e358755a2c6e38d8639d2d44926eb7198250d356b7e104d9a2b43
SHA512989763e43e021c372cb16c819de2516f3fd1b4677a6a28d56deb834a568a72327f7d593a63b19848247bbec7616cb4c10ed3d063862cb80acd2fe832bc1f7607
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1Filesize
264KB
MD5c58367cdda4a531eb617ba025634aa3e
SHA184eb4cf99c5e62c78089388e5d01cc1b9869cf8a
SHA256d573e4b5d82b9c2f6707f3d4b7351b4c17e12f02ba906eb1e2321e37414c9053
SHA5126eedb61b01850aec17a6aedbbfdcbe636113d60cb310c6b5164650c12c708621f337d252cedf6792fa0c3393b4e89e60304f9d858d242d0f1ed04a7a7eae865f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3Filesize
4.0MB
MD53a8a5b5d6f8a1297a6eda8302e9934b9
SHA1768ae8f9ca88534fec319eedaf29086c51dd10b4
SHA256a5215fea756df3bb4e0a25b9a827f12b22b46754163a4391c4ff5cefc7785869
SHA512373affce494846620b991bb02c6f0688d712486186d3eef9dd31da040caf0dc5833e70c3ad47192fc1e0f4f8589fb7ef88886f75d48b9baf623bc5fbfee7b52c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last BrowserFilesize
106B
MD5de9ef0c5bcc012a3a1131988dee272d8
SHA1fa9ccbdc969ac9e1474fce773234b28d50951cd8
SHA2563615498fbef408a96bf30e01c318dac2d5451b054998119080e7faac5995f590
SHA512cea946ebeadfe6be65e33edff6c68953a84ec2e2410884e12f406cac1e6c8a0793180433a7ef7ce097b24ea78a1fdbb4e3b3d9cdf1a827ab6ff5605da3691724
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last VersionFilesize
14B
MD59eae63c7a967fc314dd311d9f46a45b7
SHA1caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf
SHA2564288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d
SHA512bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
291KB
MD5bbdc1906dc9825e7cd32579c47a34836
SHA11bfafd6debc293fda06a318a0ce00e84d57f2306
SHA25671891da06522ee2a0553fde4b62e56e6abe24283dcca9c14750c2bc506568eac
SHA51223ac3f068798e1a5e90a2d14aa526712ca3f3fd8e80b8b780b3664089010df90343dcf7fdd3631cf469eb7435baf0f1895aa53549df5c3d57984b27d3420fc69
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
137KB
MD55445b1cdc11470b9ec94d16862475441
SHA148421090b476689057bcbd8425f53562c385ed3c
SHA256e00365e83751b5670de56cd680536ad8b9e853d49156b44b60874c85a0cbe0c4
SHA5122a37531f678010317888470666d833578655cf1d145944c5b3b1196c406a3b4244d47d34275c138c28b87f7028eba26eeafe0296f2304bbe22623e36bc2bb32e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
313KB
MD55a15b9f98cd7019cb28baff973ffaa35
SHA19a03a99d2126e90fbd39a30d325b44e0996a854f
SHA25612151c10a393abd6be057658a8bc231f1786bec72eabccb4bd7e08cc1fd9bbd4
SHA51217f105a64f89fe549dec396ad6ecee94c0e264405fc1c5fd22d44dbb2d4f4a3f8e80f382f14f9c7d606623eb82dfb2cfb185eac3b430fb946e3d912ba48d3d79
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
290KB
MD5767a59510c39a8f1b04f2acf9982836c
SHA10a653250c0fc31f2816fc4184e44d4f373946e2c
SHA2564c7ede5e6219460647d47ac1f090216bd71a8696e4d997121296bf1e161ec4f0
SHA512678f6acde1748b68857a8ce130d940c3f51e835fede0a40ae7424709472f4d032e267bd5ee2ce4c8e2ac6eabe805a2ba5bcfc53f113bc28653b87de1928bc81a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
99KB
MD5b3db435e5b2021b8749f74381c313393
SHA1a009aee30c44418e7fa4563a45ba5ff2a1701e6d
SHA2561a35f8c4e0d8845816e6bdcf0cc0565c262d33fa39181448bb2f34f26e1ffefc
SHA512f12bd5cb87946c812bf10d83eaf86ebc2f94b82bf04015742f379c88723375ae258ef8076c94703d9d8d90aebcbcdbb9749bb1177ffeee0e436be51aff8b81d6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
114KB
MD58d44e2fbb08818c86975d2339949f6ce
SHA1f2abed844e9698c97817f9638d23b4aa2cec7818
SHA2567e82eb149f8082939c23b239904fcb7215a2f2a56418238de83925cfeb17e645
SHA5125cb8a8bcb3291ea0755098a9ba833a3a140db3dfd4e85003119bca62f33d9bd5cdaecb87e190ae250266a6856d3a6afd994b61e21806a443a6fc94eaacaa09e9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
108KB
MD51161c44c0747b943b912d8f369224621
SHA1e7f6c07c4c7635b1922fbe266e5eb078a16cdf6d
SHA256c4f5dc6f5eee26a54f4757b099cbceb93c0e7bc3c0041ae448272fcca069d1af
SHA512659ddb18cdb66f40f7ff6f51f2e14bc980eb62ee796d664f6af0d32fe69997e52652e463a5ba26d4cff1e5b314c9509eb9ebb72fd47b2dbc04c0e5a54082b043
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5902c5.TMPFilesize
93KB
MD548fa06e5ead78660ac2039f6487e3418
SHA1d2ed4d656d4ee36c68f653b602a875ac1eddab51
SHA256fbc343a639287159e45d66672d08f766c80257576c648ef2069c01fe3ed7b2d0
SHA512df475918fb5d62693bee7afe038b521f83df53a1692d171e144fd01bb483461cfaf956b5197dabc9ea63bff4c3255e0a4315b436943f284d09f025f491e11886
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\VariationsFilesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\cca21451-1f3b-4435-916a-7d0e21702d80.tmpFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Temp\94135113-d2dc-4d9f-a438-cd7c568ffb96.tmp.icoFilesize
4KB
MD5c77d51e37440c8152eaecfa7414279ec
SHA1b2a96c470db78a5db21074e53d32f8a22c8d70cd
SHA2568efd9f928ec28f7a101b246bbd5370af0a493451c2618ddeebf4e8aa787267d8
SHA512a381347ccc977294c5f47743bc95fe6c834639df2eb879acf009b27eb6fbffe648bc717b078c93bd96470a73ac37464743221e9e879118860492cafd74515743
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lk2q0kix.hyo.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\nshA010.tmp\StdUtils.dllFilesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
C:\Users\Admin\AppData\Local\Temp\nshA010.tmp\WinShell.dllFilesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\34e10866-4248-437b-a94f-1e8215443c42.tmpFilesize
419B
MD519b9925f5ae5ab1de1c31828e1087af1
SHA1e9dd571be0331bbbc5625c204afe450a09d0b0a7
SHA25639f8bbaa185616767f62263ba3a669de499a55acda739aaef044c4b0a4c58197
SHA5129a0e5612024106df20f24523a944f2f014badd7bfb638a40cbce85936b2acce043d88454757050823ef4b5114a68bd548ac5a1018f25b82944b353d3a98e2adb
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\847c98ce-4299-4dc9-8d70-1007bfb38131.tmpFilesize
259B
MD582b91d25973c52190ac3b0fa496d4d9b
SHA1e9e4b4b757f23d4d5629e28a49dd9e2d3c2dbd14
SHA256a44e5f17fa99010c3e54beaee7baf24cf2f244bae7985202b96aef70ddad932b
SHA5121b4660940fabcff1e1bafa426311c2db406103d2fc1b86248544011b4aa55074e6866bd4623957dd26762317cc0a457895fbca107d6f824018fd5a12c7d5c923
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\Local Storage\leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\Network Persistent State~RFe5b20c3.TMPFilesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\TransportSecurity~RFe5aa385.TMPFilesize
419B
MD563b3419b6ef4f13dd7136d62de1ffeaf
SHA1988d0f44364583a1151993343bd720f01ccb033c
SHA256be1e1095fd20d1fd580a00c3a5633ddd09a605b3d8f2b285c82cc4f306c55871
SHA5121bf86b6f72e70e960c4d2e5d3181c86e3361bb1a9d785d033a77f9c91ee5ceaa44429233788223e446fdd4c48b272695c73413e9953f1fcd309c172bc19b7a51
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\b0d7d316-943e-4a45-ab35-3ff976eb8e53.tmpFilesize
419B
MD5588fd9061b12d52819e7cbb446124200
SHA1557e66845c95a57ce388e9beadf6de3499d1aaf8
SHA256a39603395d2618767389345cf255442d8d35ab2e7aeb6042861bf78dddaa5896
SHA51217d14286b16d6dc54a12f3d1ebdf30562b6638ece5b71945f26013acb2d091d98c98afc122d13e28b29f718e4d2ebf8f34e27c47682099c36766aca275ce0b36
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\settings.jsonFilesize
1KB
MD5cf6b608a568750adf74edb7d9e9454ab
SHA198b29cd348c12c3562c494d20ff691683a8399d3
SHA256a9dce2f8e62d6c0be34be05a15a9ed3d3a48beddf535d7f89840f424d3c45ef5
SHA5121ce6a461c0c37a98a9f28b436c36b42eccac2c812c13cea4d85354f012ee90e7fdc7ae4592cd421da5b21206aa848908e30123278b9da0b13a0c1b842a2c2c18
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\settings.jsonFilesize
1KB
MD5dd16d6fd9d0ece70d263e11e60c4affa
SHA14b460b17043caba95706d94855fc5cae0e57e9b9
SHA2561e1d70929a5642966655ff9009a8c4f37547ccf21cc1dc3ee67379e8ffc0a545
SHA5124dbb2cbf598a69719be0cbd54fcec6bf722bb7f3aed93b08729bdc8c9c715ee9ff9d7a086c4ebc566af5ad8b1b24fd228e12b3cfa9882f2a13eb09cc8fca17f4
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\settings.jsonFilesize
1KB
MD58b98a8919346812e8fc27e24634f48d8
SHA1d9cf01cf226056264c53562481664ba2b18b10ee
SHA25678b8d36886b7a0a75de4e339527edbf07aa472ae27321f793e6f3aef1a616ac3
SHA512fe0c07c3473b568ac261f54e721636c1ce86ceaf03dea3016a637cd4214c431d32584c6de2ed4f640acd9bdafb4110c8e772ed0c3c1a0e37f41d2750d903dcdd
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\settings.jsonFilesize
339B
MD518d2dc4f893cd3cdbdb5063645bdb1b4
SHA18411c6c0806a57fcbe00383c9b4eae13a7213e8e
SHA256106fca5072d7d5dbea74e9a2af6b2acfd2fd606d644169198117f9f75237d2a3
SHA512f62486a54845751c0ea350122b8e01d7213ee7eb6c92276405da04140e20d0f7fccdbc09ebc59050313527b1267c8612f434bb090595a40f39590918c5a6345f
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\settings.jsonFilesize
445B
MD5e9f6aafee0c3fde35b1f0dff20d431be
SHA122def790f485bbd5441d0a73a6832ca2b8899a41
SHA25623e919d943379e9a266dd6c3d98239f68accf8481a1cc12ba43a607b8f56a658
SHA51227a02d14956a6d059da981f03df941b83a6edec8783bd25c7e75ec377ee2bb2e46db1a6dc0cacd218eee8f07e4f1ba99246bc11130083cf1211ec9d6fa1052ea
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\settings.jsonFilesize
672B
MD5bf660a0597227a5d8e61dc32302b5747
SHA1b702ad93e8485a0346adf7b1f1ffb99b2b847767
SHA2560d5b4cf9a04f455fb410a179113bca19ae6db3255d928420534c208a5f0d0dae
SHA512db92604f176f0bd374d5e8eb02e52e182bd5cb96314a72bb2296827ada2f73999b4be5829e26acea7bc516c66c192f19a3a92481719bcc4ec7d64d3630864e7f
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\settings.jsonFilesize
893B
MD5f11a2a2ebd18f0fff1642784b3ce8d76
SHA1f0dd5bea5d4f392f10b36865b5a204ad3d29ca7b
SHA2561fee3508c0a872fe2c5fe077044b75db67e2e618b26c64303ad1998c37aa9f10
SHA51255a147cdce2ab4bf751db2ec65058a02abd73f386d42ad08c08815db0c04bbda849aa1d36a1f6b5fcc0c3ccc986fd15cbbb2062b2060301c1f988098fd5f7863
-
C:\Users\Admin\AppData\Roaming\unmineable-miner-mfi\settings.jsonFilesize
1012B
MD5c21536370c1e8c7725fb9c4a5d4e0ec5
SHA13b00923e6a9f974b84d3725bf412b8cfb3fbdf57
SHA256f8b01262f2dbdb7ea320f68ecd97ace208d8723b9dace8618ae7a9c1eb210eb9
SHA5125ab37e89d0ef166a31881068d0d0f8984c02936582af5e293854e0f8cce1a4874bad8f025dfff6f4c58e05de0a2c110e96f1aa5927462a424fd7bb8cfdff00e9
-
\??\pipe\crashpad_3224_OSKUXNLXOJSBGVEWMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/372-2886-0x0000019780130000-0x0000019780189000-memory.dmpFilesize
356KB
-
memory/372-710-0x00007FFB59D70000-0x00007FFB59D71000-memory.dmpFilesize
4KB
-
memory/2712-3089-0x000002C611AE0000-0x000002C611B00000-memory.dmpFilesize
128KB
-
memory/3312-1418-0x00000253EAA40000-0x00000253EAA6A000-memory.dmpFilesize
168KB
-
memory/3312-1437-0x00000253EAA40000-0x00000253EAA62000-memory.dmpFilesize
136KB
-
memory/5012-935-0x0000012EF8900000-0x0000012EF8922000-memory.dmpFilesize
136KB
-
memory/5012-966-0x0000012EF8CD0000-0x0000012EF8D0C000-memory.dmpFilesize
240KB
-
memory/5012-998-0x0000012EF8FF0000-0x0000012EF9066000-memory.dmpFilesize
472KB