Analysis Overview
SHA256
d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7
Threat Level: Known bad
The file d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7 was found to be: Known bad.
Malicious Activity Summary
GCleaner
Socelars payload
Process spawned unexpected child process
Socelars
Checks for common network interception software
Downloads MZ/PE file
Drops file in Drivers directory
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Drops file in Program Files directory
Enumerates physical storage devices
Program crash
Suspicious behavior: EnumeratesProcesses
Modifies registry class
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of WriteProcessMemory
Script User-Agent
Suspicious use of SetWindowsHookEx
Kills process with taskkill
Suspicious use of SendNotifyMessage
Suspicious use of AdjustPrivilegeToken
Enumerates system info in registry
Suspicious use of FindShellTrayWindow
Modifies data under HKEY_USERS
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-02-28 14:05
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2023-02-28 14:05
Reported
2023-02-28 14:07
Platform
win10v2004-20230221-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
GCleaner
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process | N/A | C:\Windows\system32\rundll32.exe |
Socelars
Socelars payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Checks for common network interception software
Downloads MZ/PE file
Drops file in Drivers directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\system32\drivers\etc\hosts | C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exe | N/A |
Executes dropped EXE
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\is-LE8UM.tmp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp | N/A |
| N/A | N/A | C:\Windows\SysWOW64\rundll32.exe | N/A |
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\system recover = "\"C:\\Program Files (x86)\\Windows Multimedia Platform\\Susasykojy.exe\"" | C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe | N/A |
Legitimate hosting services abused for malware hosting/C2
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\a234e2ac-f5af-4da4-8338-a50123661d98.tmp | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe | N/A |
| File created | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\background.html | C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe | N/A |
| File created | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\mode-ecb.js | C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe | N/A |
| File created | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\icon.png | C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe | N/A |
| File created | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\background.js | C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe | N/A |
| File created | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\content.js | C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe | N/A |
| File created | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\pad-nopadding.js | C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe | N/A |
| File created | C:\Program Files\Windows Media Player\EUNDMYEPMU\poweroff.exe | C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe | N/A |
| File created | C:\Program Files (x86)\Windows Multimedia Platform\Susasykojy.exe.config | C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe | N/A |
| File created | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\manifest.json | C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe | N/A |
| File opened for modification | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\background.js | C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe | N/A |
| File opened for modification | C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230221030625.pma | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe | N/A |
| File created | C:\Program Files (x86)\Windows Multimedia Platform\Susasykojy.exe | C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe | N/A |
| File created | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\jquery-3.3.1.min.js | C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe | N/A |
| File created | C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\aes.js | C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe | N/A |
Enumerates physical storage devices
Program crash
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Kills process with taskkill
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\taskkill.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Script User-Agent
| Description | Indicator | Process | Target |
| HTTP User-Agent header | Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| N/A | N/A | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exe
"C:\Users\Admin\AppData\Local\Temp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exe"
C:\Users\Admin\AppData\Local\Temp\is-LE8UM.tmp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp
"C:\Users\Admin\AppData\Local\Temp\is-LE8UM.tmp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp" /SL5="$13004E,138982,55296,C:\Users\Admin\AppData\Local\Temp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.exe"
C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe
"C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe" /S /UID=95
C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exe
"C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exe"
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exe
"C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbb01e46f8,0x7ffbb01e4708,0x7ffbb01e4718
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exe /mixfive & exit
C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exe
C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exe /mixfive
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 7472 -ip 7472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 444
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe & exit
C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe
C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:8
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c taskkill /f /im chrome.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 7472 -ip 7472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 752
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im chrome.exe
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe & exit
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 7472 -ip 7472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 780
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 7472 -ip 7472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 792
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe
"C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe" -h
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 7472 -ip 7472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 784
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 7472 -ip 7472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 936
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 7472 -ip 7472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 1004
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 7472 -ip 7472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 1068
C:\Windows\system32\rundll32.exe
rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\Admin\AppData\Local\Temp\db.dll",open
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5728 -ip 5728
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5728 -s 600
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 7472 -ip 7472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 1380
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /im "gcleaner.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exe" & exit
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 7472 -ip 7472
C:\Windows\SysWOW64\taskkill.exe
taskkill /im "gcleaner.exe" /f
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7472 -s 512
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbab879758,0x7ffbab879768,0x7ffbab879778
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3152 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3284 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3824 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4732 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4860 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4880 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x130,0x22c,0x7ff7c8405460,0x7ff7c8405470,0x7ff7c8405480
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5192 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,955025956996944257,12822347712838009038,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1044 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2932 --field-trial-handle=1780,i,1965151874189885434,1766049943600489572,131072 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | s3.eu-central-1.wasabisys.com | udp |
| NL | 130.117.252.32:80 | s3.eu-central-1.wasabisys.com | tcp |
| US | 8.8.8.8:53 | 123.108.74.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 33.146.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.220.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | connectini.net | udp |
| GB | 37.230.138.123:443 | connectini.net | tcp |
| US | 8.8.8.8:53 | 32.252.117.130.in-addr.arpa | udp |
| US | 8.8.8.8:53 | wewewe.s3.eu-central-1.amazonaws.com | udp |
| US | 8.8.8.8:53 | n8w5.c12.e2-1.dev | udp |
| US | 8.8.8.8:53 | s3.eu-central-1.wasabisys.com | udp |
| NL | 130.117.252.13:443 | s3.eu-central-1.wasabisys.com | tcp |
| NL | 130.117.252.13:443 | s3.eu-central-1.wasabisys.com | tcp |
| DE | 3.5.136.142:443 | wewewe.s3.eu-central-1.amazonaws.com | tcp |
| US | 8.8.8.8:53 | 360devtracking.com | udp |
| GB | 37.230.138.66:80 | 360devtracking.com | tcp |
| US | 8.8.8.8:53 | 123.138.230.37.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 142.136.5.3.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.252.117.130.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 210.81.184.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 42.220.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 66.138.230.37.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | google.com | udp |
| NL | 142.251.39.100:80 | www.google.com | tcp |
| US | 8.8.8.8:53 | connectini.net | udp |
| GB | 37.230.138.123:443 | connectini.net | tcp |
| GB | 37.230.138.123:443 | connectini.net | tcp |
| US | 8.8.8.8:53 | 100.39.251.142.in-addr.arpa | udp |
| GB | 37.230.138.66:80 | 360devtracking.com | tcp |
| NL | 45.12.253.74:80 | 45.12.253.74 | tcp |
| US | 8.8.8.8:53 | iplogger.org | udp |
| DE | 148.251.234.83:443 | iplogger.org | tcp |
| US | 8.8.8.8:53 | htagzdownload.pw | udp |
| US | 8.8.8.8:53 | 74.253.12.45.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.234.251.148.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.cpasdrole.com | udp |
| US | 188.114.96.0:80 | www.cpasdrole.com | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| US | 8.8.8.8:53 | www.countlist.top | udp |
| US | 8.8.8.8:53 | www.ippfinfo.top | udp |
| DE | 178.18.252.110:443 | www.ippfinfo.top | tcp |
| US | 8.8.8.8:53 | 0.96.114.188.in-addr.arpa | udp |
| US | 170.106.49.122:80 | www.countlist.top | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| US | 8.8.8.8:53 | ocsp.trust-provider.cn | udp |
| NL | 47.246.48.208:80 | ocsp.trust-provider.cn | tcp |
| US | 170.106.49.122:80 | www.countlist.top | tcp |
| US | 8.8.8.8:53 | a.dowgmua.com | udp |
| US | 188.114.96.1:443 | a.dowgmua.com | tcp |
| US | 8.8.8.8:53 | 110.252.18.178.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 188.155.64.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 122.49.106.170.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.61.205.35.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.48.246.47.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1.96.114.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.profitabletrustednetwork.com | udp |
| US | 8.8.8.8:53 | b.dowgmub.com | udp |
| US | 104.21.70.228:443 | b.dowgmub.com | tcp |
| DE | 148.251.234.83:443 | iplogger.org | tcp |
| US | 192.243.59.13:443 | www.profitabletrustednetwork.com | tcp |
| US | 192.243.59.13:443 | www.profitabletrustednetwork.com | tcp |
| US | 8.8.8.8:53 | nav.smartscreen.msiserver.lan | udp |
| US | 8.8.8.8:53 | 14.110.152.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.70.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 234.95.206.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 250.255.255.239.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.59.243.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | simplewebanalysis.com | udp |
| IN | 15.207.156.54:443 | simplewebanalysis.com | tcp |
| US | 8.8.8.8:53 | tracker-tds2.site | udp |
| FI | 95.216.226.187:443 | tracker-tds2.site | tcp |
| US | 8.8.8.8:53 | coressp.top | udp |
| DE | 5.75.133.219:443 | coressp.top | tcp |
| US | 8.8.8.8:53 | 54.156.207.15.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.76.208.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 187.226.216.95.in-addr.arpa | udp |
| US | 8.8.8.8:53 | new.lightfoot.top | udp |
| DE | 116.202.184.109:443 | new.lightfoot.top | tcp |
| US | 8.8.8.8:53 | js.pushssp.top | udp |
| DE | 5.75.133.219:443 | js.pushssp.top | tcp |
| US | 8.8.8.8:53 | xv.yxzgamen.com | udp |
| US | 188.114.96.0:443 | xv.yxzgamen.com | tcp |
| US | 8.8.8.8:53 | js.cdnpsh.com | udp |
| DE | 5.75.133.219:443 | js.cdnpsh.com | tcp |
| US | 8.8.8.8:53 | feed.cdnpsh.com | udp |
| US | 8.8.8.8:53 | 219.133.75.5.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 109.184.202.116.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 163.179.250.142.in-addr.arpa | udp |
| NL | 45.12.253.56:80 | 45.12.253.56 | tcp |
| US | 8.8.8.8:53 | 56.253.12.45.in-addr.arpa | udp |
| US | 8.8.8.8:53 | arc.srv.lan | udp |
| US | 8.8.8.8:53 | ntp.srv.lan | udp |
| US | 8.8.8.8:53 | nav.smartscreen.msiserver.lan | udp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | edge.msiserver.lan | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | accounts.server.lan | udp |
| US | 8.8.8.8:53 | m.facebook.com | udp |
| US | 8.8.8.8:53 | ferramentasadicionais.s3.sa-east-1.amazonaws.com | udp |
| US | 157.240.5.35:443 | m.facebook.com | tcp |
| BR | 52.95.163.126:443 | ferramentasadicionais.s3.sa-east-1.amazonaws.com | tcp |
| US | 8.8.8.8:53 | 234.168.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 254.105.26.67.in-addr.arpa | udp |
| US | 157.240.5.35:443 | m.facebook.com | udp |
| US | 8.8.8.8:53 | secure.facebook.com | udp |
| US | 157.240.5.21:443 | secure.facebook.com | tcp |
| US | 8.8.8.8:53 | www.evoori.com | udp |
| US | 188.114.97.0:80 | www.evoori.com | tcp |
| US | 8.8.8.8:53 | www.facebook.com | udp |
| NL | 157.240.247.35:443 | www.facebook.com | tcp |
| US | 8.8.8.8:53 | 35.5.240.157.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 126.163.95.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.5.240.157.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.97.114.188.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 35.247.240.157.in-addr.arpa | udp |
| US | 8.8.8.8:53 | apis.google.com | udp |
| NL | 172.217.168.206:443 | apis.google.com | udp |
| US | 8.8.8.8:53 | 206.168.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | clients2.google.com | udp |
| NL | 142.251.36.46:443 | clients2.google.com | udp |
| US | 8.8.8.8:53 | 46.36.251.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 164.2.77.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | accounts.server.lan | udp |
| US | 8.8.8.8:53 | 50.4.107.13.in-addr.arpa | udp |
| US | 20.189.173.6:443 | tcp | |
| US | 157.240.5.35:443 | m.facebook.com | udp |
| US | 157.240.5.21:443 | secure.facebook.com | udp |
| NL | 157.240.247.35:443 | www.facebook.com | udp |
| US | 8.8.8.8:53 | accounts.server.lan | udp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| US | 8.8.8.8:53 | edge.msiserver.lan | udp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| US | 8.8.8.8:53 | update.msiservers.lan | udp |
| US | 157.240.5.35:443 | m.facebook.com | udp |
| US | 157.240.5.21:443 | secure.facebook.com | udp |
| NL | 157.240.247.35:443 | www.facebook.com | udp |
| US | 8.8.8.8:53 | 126.24.238.8.in-addr.arpa | udp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| BE | 35.205.61.67:80 | htagzdownload.pw | tcp |
| US | 8.8.8.8:53 | accounts.server.lan | udp |
| US | 8.8.8.8:53 | beacons.gcp.gvt2.com | udp |
| US | 35.190.80.156:443 | beacons.gcp.gvt2.com | tcp |
| US | 35.190.80.156:443 | beacons.gcp.gvt2.com | tcp |
| US | 8.8.8.8:53 | e2c38.gcp.gvt2.com | udp |
| AU | 35.213.232.93:443 | e2c38.gcp.gvt2.com | tcp |
| AU | 35.213.232.93:443 | e2c38.gcp.gvt2.com | tcp |
| US | 8.8.8.8:53 | 156.80.190.35.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 93.232.213.35.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.listfcbt.top | udp |
| US | 8.8.8.8:53 | m.facebook.com | udp |
| US | 157.240.5.35:443 | m.facebook.com | udp |
| US | 8.8.8.8:53 | beacons.gvt2.com | udp |
| US | 8.8.8.8:53 | www.typefdq.xyz | udp |
| DE | 142.250.180.99:443 | beacons.gvt2.com | tcp |
| US | 8.8.8.8:53 | www.rqckdpt.top | udp |
| US | 8.8.8.8:53 | secure.facebook.com | udp |
| US | 157.240.5.21:443 | secure.facebook.com | udp |
| US | 8.8.8.8:53 | 99.180.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.facebook.com | udp |
| NL | 157.240.247.35:443 | www.facebook.com | udp |
Files
memory/3812-133-0x0000000000400000-0x0000000000414000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\is-LE8UM.tmp\d6c7416582172b48537000e0f604ad4836c2298130ce61ee64187d2e5659bdf7.tmp
| MD5 | a926ae0ea031d6db49d5d679003ef95c |
| SHA1 | 03657bd9d3de4c69f8a30aab28eceaced746c68b |
| SHA256 | 1ec67071cc0dfea4a41830ef4982f42d6e42d831477d1e1dcadd6d13ab88bb8c |
| SHA512 | 5bf58812bf5bdbb6ce94949b58d2b8d3149a1d8a5457eb6c492c77fc51dbbd3ce2780133afd8276481a6c7abb683cee5a41dc262bd98164713691b37144726c2 |
C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\idp.dll
| MD5 | 8f995688085bced38ba7795f60a5e1d3 |
| SHA1 | 5b1ad67a149c05c50d6e388527af5c8a0af4343a |
| SHA256 | 203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006 |
| SHA512 | 043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35 |
C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe
| MD5 | f6c312d7bc53140df83864221e8ebee1 |
| SHA1 | da7ad1f5fa18bf00c3352cb510554b061bbfe04f |
| SHA256 | e119a3b5fcb628740e8313a44d312296fd03771d9ed727b10b58aae29192a2db |
| SHA512 | 38c9d9b32fd1ee096f23ee62b5e64cc962f21a85d07ea32860d45d5e8249474d28239238a635cf69db30fd3f035c7c93dcce264a9e8288dbef70ffe2a493922a |
C:\Users\Admin\AppData\Local\Temp\is-TU1GS.tmp\BOLTin1.exe
| MD5 | f6c312d7bc53140df83864221e8ebee1 |
| SHA1 | da7ad1f5fa18bf00c3352cb510554b061bbfe04f |
| SHA256 | e119a3b5fcb628740e8313a44d312296fd03771d9ed727b10b58aae29192a2db |
| SHA512 | 38c9d9b32fd1ee096f23ee62b5e64cc962f21a85d07ea32860d45d5e8249474d28239238a635cf69db30fd3f035c7c93dcce264a9e8288dbef70ffe2a493922a |
memory/4648-150-0x0000000002500000-0x0000000002501000-memory.dmp
memory/3608-151-0x0000000000BB0000-0x0000000000C46000-memory.dmp
memory/3608-152-0x000000001B7F0000-0x000000001B800000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exe
| MD5 | 1e8e3939ec32c19b2031d50cc9875084 |
| SHA1 | 83cc7708448c52f5c184cc329fa11f4cfe9c2823 |
| SHA256 | 5988245cd9d0c40bcb12155b966cb8ddd86da1107bca456341de5bd5fb560808 |
| SHA512 | 0d3ad7c0865e421fad34e27a47108fdc9e359f8603c4c01f6d789d3ead6e6ac5815f979301870f8157fedaf8178ed34873fbff807807d46698249f098fc78caa |
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exe
| MD5 | fba3b4b12a0c6c9924132b149147a0a2 |
| SHA1 | a776068968a89ff9503e794e4ab0c04bbee6e5f6 |
| SHA256 | 7403a6d53688cddeb84997cf90f616a3f25e79681b9c47074b5534f4e8b45890 |
| SHA512 | a1a41956ee97b4e590795a319d357f7f1b22115f5f663211af71cb14ffae879cb0fda743c7a016bb1a479d64dacee2f865e67f29d589d30d10b928a2bbb628ee |
C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exe
| MD5 | 1e8e3939ec32c19b2031d50cc9875084 |
| SHA1 | 83cc7708448c52f5c184cc329fa11f4cfe9c2823 |
| SHA256 | 5988245cd9d0c40bcb12155b966cb8ddd86da1107bca456341de5bd5fb560808 |
| SHA512 | 0d3ad7c0865e421fad34e27a47108fdc9e359f8603c4c01f6d789d3ead6e6ac5815f979301870f8157fedaf8178ed34873fbff807807d46698249f098fc78caa |
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exe
| MD5 | fba3b4b12a0c6c9924132b149147a0a2 |
| SHA1 | a776068968a89ff9503e794e4ab0c04bbee6e5f6 |
| SHA256 | 7403a6d53688cddeb84997cf90f616a3f25e79681b9c47074b5534f4e8b45890 |
| SHA512 | a1a41956ee97b4e590795a319d357f7f1b22115f5f663211af71cb14ffae879cb0fda743c7a016bb1a479d64dacee2f865e67f29d589d30d10b928a2bbb628ee |
C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exe
| MD5 | 1e8e3939ec32c19b2031d50cc9875084 |
| SHA1 | 83cc7708448c52f5c184cc329fa11f4cfe9c2823 |
| SHA256 | 5988245cd9d0c40bcb12155b966cb8ddd86da1107bca456341de5bd5fb560808 |
| SHA512 | 0d3ad7c0865e421fad34e27a47108fdc9e359f8603c4c01f6d789d3ead6e6ac5815f979301870f8157fedaf8178ed34873fbff807807d46698249f098fc78caa |
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exe.config
| MD5 | 98d2687aec923f98c37f7cda8de0eb19 |
| SHA1 | f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7 |
| SHA256 | 8a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465 |
| SHA512 | 95c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590 |
C:\Users\Admin\AppData\Local\Temp\6c-2b4e0-0e6-d9faa-70c498d56fa61\Susasykojy.exe.config
| MD5 | 98d2687aec923f98c37f7cda8de0eb19 |
| SHA1 | f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7 |
| SHA256 | 8a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465 |
| SHA512 | 95c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590 |
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Susasykojy.exe
| MD5 | fba3b4b12a0c6c9924132b149147a0a2 |
| SHA1 | a776068968a89ff9503e794e4ab0c04bbee6e5f6 |
| SHA256 | 7403a6d53688cddeb84997cf90f616a3f25e79681b9c47074b5534f4e8b45890 |
| SHA512 | a1a41956ee97b4e590795a319d357f7f1b22115f5f663211af71cb14ffae879cb0fda743c7a016bb1a479d64dacee2f865e67f29d589d30d10b928a2bbb628ee |
memory/4648-188-0x0000000000400000-0x00000000004BD000-memory.dmp
memory/3812-191-0x0000000000400000-0x0000000000414000-memory.dmp
memory/2712-193-0x0000000000C00000-0x0000000000C7A000-memory.dmp
memory/2696-192-0x00000000001E0000-0x000000000024A000-memory.dmp
memory/2712-194-0x0000000001570000-0x00000000015D6000-memory.dmp
memory/2712-195-0x000000001C2A0000-0x000000001C76E000-memory.dmp
memory/2712-196-0x0000000001740000-0x0000000001750000-memory.dmp
memory/2696-197-0x0000000000BE0000-0x0000000000BF0000-memory.dmp
memory/2712-198-0x000000001C910000-0x000000001C9AC000-memory.dmp
memory/2712-199-0x00000000015E0000-0x00000000015E8000-memory.dmp
memory/2712-200-0x000000001E1F0000-0x000000001E24E000-memory.dmp
memory/2712-201-0x0000000001740000-0x0000000001750000-memory.dmp
memory/2712-202-0x00000000209F0000-0x0000000020CFE000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\26-024bc-b43-717a1-c0acfcbf1cf77\Kenessey.txt
| MD5 | 97384261b8bbf966df16e5ad509922db |
| SHA1 | 2fc42d37fee2c81d767e09fb298b70c748940f86 |
| SHA256 | 9c0d294c05fc1d88d698034609bb81c0c69196327594e4c69d2915c80fd9850c |
| SHA512 | b77fe2d86fbc5bd116d6a073eb447e76a74add3fa0d0b801f97535963241be3cdce1dbcaed603b78f020d0845b2d4bfc892ceb2a7d1c8f1d98abc4812ef5af21 |
memory/2712-204-0x0000000020E20000-0x0000000020E82000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exe
| MD5 | 94ba289cb1b8156be3b56429c49bcfe3 |
| SHA1 | e194007c1a1a4622be907a4355c475bf0ed4f16f |
| SHA256 | 5e46806581a7701985035b7ef83f4d9a88fea041499905eb7bd15a3a93378ea5 |
| SHA512 | 379016a783762b2feef8927b2009aab9698990c8ec1cb60ce08ce0007cd16f9aaf20548d95f3df256537e9871cf41f50d63f29659fd04e501384bda291db87e8 |
C:\Users\Admin\AppData\Local\Temp\yjr5ogmr.4rx\gcleaner.exe
| MD5 | 94ba289cb1b8156be3b56429c49bcfe3 |
| SHA1 | e194007c1a1a4622be907a4355c475bf0ed4f16f |
| SHA256 | 5e46806581a7701985035b7ef83f4d9a88fea041499905eb7bd15a3a93378ea5 |
| SHA512 | 379016a783762b2feef8927b2009aab9698990c8ec1cb60ce08ce0007cd16f9aaf20548d95f3df256537e9871cf41f50d63f29659fd04e501384bda291db87e8 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 5a10efe23009825eadc90c37a38d9401 |
| SHA1 | fd98f2ca011408d4b43ed4dfd5b6906fbc7b87c0 |
| SHA256 | 05e135dee0260b4f601a0486401b64ff8653875d74bf259c2da232550dbfb4f5 |
| SHA512 | 89416a3f5bf50cd4a432ac72cd0a7fb79d5aeb10bdcc468c55bbfa79b9f43fab17141305d44cb1fe980ec76cc6575c27e2bcfcbad5ccd886d45b9de03fb9d6d7 |
memory/7472-216-0x0000000002D20000-0x0000000002D60000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe
| MD5 | fce50d42c32ea7de3d5da455cd2ead3e |
| SHA1 | 7fcbe29cf60fb2f9ba1380a33747c3d6665316ad |
| SHA256 | 0b70ee102482780a5039700c0edfeb2d483b3f142bbf8ee23a5c364d626da672 |
| SHA512 | 9df5dc04607eb51ef7944daffe0ba4cc593debcb2763577ef5fab2e6e47b68426060fc80dd3bef56db7425c860f0f1459619f8715c84492d22d83fc43f4a6e99 |
C:\Users\Admin\AppData\Local\Temp\oboraje2.14m\handdiy_3.exe
| MD5 | fce50d42c32ea7de3d5da455cd2ead3e |
| SHA1 | 7fcbe29cf60fb2f9ba1380a33747c3d6665316ad |
| SHA256 | 0b70ee102482780a5039700c0edfeb2d483b3f142bbf8ee23a5c364d626da672 |
| SHA512 | 9df5dc04607eb51ef7944daffe0ba4cc593debcb2763577ef5fab2e6e47b68426060fc80dd3bef56db7425c860f0f1459619f8715c84492d22d83fc43f4a6e99 |
memory/8044-230-0x00007FFBCF530000-0x00007FFBCF531000-memory.dmp
\??\pipe\LOCAL\crashpad_2212_CGORRBMBYHPCBPVY
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico
| MD5 | e5e3377341056643b0494b6842c0b544 |
| SHA1 | d53fd8e256ec9d5cef8ef5387872e544a2df9108 |
| SHA256 | e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25 |
| SHA512 | 83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | c1a3c45dc07f766430f7feaa3000fb18 |
| SHA1 | 698a0485bcf0ab2a9283d4ebd31ade980b0661d1 |
| SHA256 | adaba08026551b1b8f6c120143686da79f916d02adbef4a8d1c184e32a19fd48 |
| SHA512 | 9fc93f01ab4b14f555791d757ffe881787cc697102547c61847552e597e206e70c6d35fedff559c72a0a67d1b95e769095ecb0a8a7d4f07cf58a7a0d57d3e9f4 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT
| MD5 | 46295cac801e5d4857d09837238a6394 |
| SHA1 | 44e0fa1b517dbf802b18faf0785eeea6ac51594b |
| SHA256 | 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443 |
| SHA512 | 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001
| MD5 | 5af87dfd673ba2115e2fcf5cfdb727ab |
| SHA1 | d5b5bbf396dc291274584ef71f444f420b6056f1 |
| SHA256 | f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4 |
| SHA512 | de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences
| MD5 | 5edab6d3ffbeee247ccb4423f929a323 |
| SHA1 | a4ad201d149d59392a2a3163bd86ee900e20f3d9 |
| SHA256 | 460cddb95ea1d9bc8d95d295dd051b49a1436437a91ddec5f131235b2d516933 |
| SHA512 | 263fa99f03ea1ef381ca19f10fbe0362c1f9c129502dc6b730b076cafcf34b40a70ee8a0ee9446ec9c89c3a2d9855450609ec0f8cf9d0a1b2aebdd12be58d38c |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 306629018af15325a7bff67b74949277 |
| SHA1 | 90f517c34183da40b0ada0417cd41ae3cba3d4c1 |
| SHA256 | f321100c7c8a62e023287dfc2fdd0338aaefe36eeff79dc87d6b43afb1f54add |
| SHA512 | fc2de86e5c7e919c244a0d180f675f01957ccedd339fe14555f4d3f9a5c54c401e56879ebd6aef8860cab4e7398e45ea0d718ef2465a063dd32a23e2b97156cf |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnk
| MD5 | 51092b05a31a72626c8c83b3f2a0e1cc |
| SHA1 | 9751be64131d6f57605142f62f23445558f5e823 |
| SHA256 | f552c5584d8b2fdca62e59458b65a27f5e2f8b453a85c24e80b1bde42a24d24a |
| SHA512 | d9bdea74cf29328c7c28f0afe23aaba0f937c194d00caaccd8c9f2d5342dba8b51f4c887ccfe690098cd66e98c8b9af60ba513644d3c75a8ac01380016277366 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
| MD5 | ec8ff3b1ded0246437b1472c69dd1811 |
| SHA1 | d813e874c2524e3a7da6c466c67854ad16800326 |
| SHA256 | e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab |
| SHA512 | e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
| MD5 | 41ba206fa6b00daa14072820b73d2bdc |
| SHA1 | 99200896bfba01b5ea5bf6720ef4009e03a85d88 |
| SHA256 | 3ba6b19ab058b5a558657be17ec94e41b4d70d2cc8d046ee994d7d6e3348c5e8 |
| SHA512 | 50e46ed78342a6e7a6235bb3622cc74b5bf363af388214c159dd51757fb7dd43fc911c7df1bbd760115e8e32c882fc22e924311baf8a9fd767b3aa96e0b0030e |
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe
| MD5 | dc719929115e50ed4383bcc7f7182be3 |
| SHA1 | 562e69bdf814c156872fd6ad6a3d0116b0304516 |
| SHA256 | 5b0708551a5c3cf9932c8aea5e890e3f2abe7b7b5911cefebc6155d20692e365 |
| SHA512 | 34b1dda47ff7a20052f582f4874dc35f4e768558baf8727419d5f91ec2f8c6e28d2a6bc0253975e6bac5d45edfa1edd09aabc5339d2caade73418b73096b9404 |
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe
| MD5 | dc719929115e50ed4383bcc7f7182be3 |
| SHA1 | 562e69bdf814c156872fd6ad6a3d0116b0304516 |
| SHA256 | 5b0708551a5c3cf9932c8aea5e890e3f2abe7b7b5911cefebc6155d20692e365 |
| SHA512 | 34b1dda47ff7a20052f582f4874dc35f4e768558baf8727419d5f91ec2f8c6e28d2a6bc0253975e6bac5d45edfa1edd09aabc5339d2caade73418b73096b9404 |
C:\Users\Admin\AppData\Local\Temp\l041or4h.2lu\chenp.exe
| MD5 | dc719929115e50ed4383bcc7f7182be3 |
| SHA1 | 562e69bdf814c156872fd6ad6a3d0116b0304516 |
| SHA256 | 5b0708551a5c3cf9932c8aea5e890e3f2abe7b7b5911cefebc6155d20692e365 |
| SHA512 | 34b1dda47ff7a20052f582f4874dc35f4e768558baf8727419d5f91ec2f8c6e28d2a6bc0253975e6bac5d45edfa1edd09aabc5339d2caade73418b73096b9404 |
C:\Users\Admin\AppData\Local\Temp\db.dll
| MD5 | 1b20e998d058e813dfc515867d31124f |
| SHA1 | c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f |
| SHA256 | 24a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00 |
| SHA512 | 79849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6 |
C:\Users\Admin\AppData\Local\Temp\db.dll
| MD5 | 1b20e998d058e813dfc515867d31124f |
| SHA1 | c9dc9c42a748af18ae1a8c882b90a2b9e3313e6f |
| SHA256 | 24a53033a2e89acf65f6a5e60d35cb223585817032635e81bf31264eb7dabd00 |
| SHA512 | 79849fbdb9a9e7f7684b570d14662448b093b8aa2b23dfd95856db3a78faf75a95d95c51b8aa8506c4fbecffebcc57cd153dda38c830c05b8cd38629fae673c6 |
C:\Users\Admin\AppData\Local\Temp\db.dat
| MD5 | 76c3dbb1e9fea62090cdf53dadcbe28e |
| SHA1 | d44b32d04adc810c6df258be85dc6b62bd48a307 |
| SHA256 | 556fd54e5595d222cfa2bd353afa66d8d4d1fbb3003afed604672fceae991860 |
| SHA512 | de4ea57497cf26237430880742f59e8d2a0ac7e7a0b09ed7be590f36fbd08c9ced0ffe46eb69ec2215a9cff55720f24fffcae752cd282250b4da6b75a30b3a1b |
memory/2712-376-0x0000000001740000-0x0000000001750000-memory.dmp
memory/2696-377-0x0000000000BE0000-0x0000000000BF0000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
| MD5 | 0d9535e6da0679d689f3eb949ae3f4ce |
| SHA1 | 8a64631cd0d0dc0dce0ceec00b74546efeebaabc |
| SHA256 | 6cbc69c97dbcbcb1bab400c20f8843c61c57041ee26666773e798c6a9b2a3abb |
| SHA512 | aa58e82e702f8e6b2b25168c28106cb02ff921cadd56d0ba2a6858ae97468a2d81721a6fda2c79240e2d204e9c7e2b17305e6dd556f67f73f039f07b8cc7daac |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 206702161f94c5cd39fadd03f4014d98 |
| SHA1 | bd8bfc144fb5326d21bd1531523d9fb50e1b600a |
| SHA256 | 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167 |
| SHA512 | 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145 |
memory/2712-417-0x0000000001740000-0x0000000001750000-memory.dmp
memory/7472-416-0x0000000000400000-0x0000000002BC3000-memory.dmp
memory/6716-433-0x00007FFBCF530000-0x00007FFBCF531000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 38f3e72eea1ef7d486c42a77d82af5e5 |
| SHA1 | 5645fc83017c8056814591fd9af6118f9a8fd908 |
| SHA256 | 2a973bedb8db2e460b241d9f0802dc80ffcbe3f1ced31b77a17ef75bbbf7dad9 |
| SHA512 | 43c1ea3e4bcf06432e287239126dd3fae1c16a4d8392eed8757f07ebac4cfdff60a506b5b9306dc55a52dc21941b4b39c6c1f41ce4b5dcb6f6db87c3ace3d094 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
| MD5 | 973e33d24ebbe8b07ab002a2daf45f85 |
| SHA1 | e763b14aba9e85db3be16d8e3b141c6a0ced99c9 |
| SHA256 | 10e1df46fbc34b42ec83784b6f1acad7a1acaa8c4701b92190b6b8f31de98e51 |
| SHA512 | 8423fc5e8519a5057ce6aa4d61416e801d9ffccb552ce654dec99eef04981e843da0cc6106646ae8c70b09b2c4b6dfd1fa345173f71ffe7d9835e2cc05e42207 |
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\manifest.json
| MD5 | 05bfb082915ee2b59a7f32fa3cc79432 |
| SHA1 | c1acd799ae271bcdde50f30082d25af31c1208c3 |
| SHA256 | 04392a223cc358bc79fcd306504e8e834d6febbff0f3496f2eb8451797d28aa1 |
| SHA512 | 6feea1c8112ac33d117aef3f272b1cc42ec24731c51886ed6f8bc2257b91e4d80089e8ca7ce292cc2f39100a7f662bcc5c37e5622a786f8dc8ea46b8127152f3 |
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\jquery-3.3.1.min.js
| MD5 | a09e13ee94d51c524b7e2a728c7d4039 |
| SHA1 | 0dc32db4aa9c5f03f3b38c47d883dbd4fed13aae |
| SHA256 | 160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef |
| SHA512 | f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a |
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\icon.png
| MD5 | 362695f3dd9c02c83039898198484188 |
| SHA1 | 85dcacc66a106feca7a94a42fc43e08c806a0322 |
| SHA256 | 40cfea52dbc50a8a5c250c63d825dcaad3f76e9588f474b3e035b587c912f4ca |
| SHA512 | a04dc31a6ffc3bb5d56ba0fb03ecf93a88adc7193a384313d2955701bd99441ddf507aa0ddfc61dfc94f10a7e571b3d6a35980e61b06f98dd9eee424dc594a6f |
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\content.js
| MD5 | c31f14d9b1b840e4b9c851cbe843fc8f |
| SHA1 | 205e3a99dc6c0af0e2f4450ebaa49ebde8e76bb4 |
| SHA256 | 03601415885fd5d8967c407f7320d53f4c9ca2ec33bbe767d73a1589c5e36c54 |
| SHA512 | 2c3d7ed5384712a0013a2ebbc526e762f257e32199651192742282a9641946b6aea6235d848b1e8cb3b0f916f85d3708a14717a69cbcf081145bc634d11d75aa |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | 285252a2f6327d41eab203dc2f402c67 |
| SHA1 | acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6 |
| SHA256 | 5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026 |
| SHA512 | 11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d |
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\background.html
| MD5 | 9ffe618d587a0685d80e9f8bb7d89d39 |
| SHA1 | 8e9cae42c911027aafae56f9b1a16eb8dd7a739c |
| SHA256 | a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e |
| SHA512 | a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12 |
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\background.js
| MD5 | 0eebfbd134704a59379fecb3baa3c0a0 |
| SHA1 | c4f79aeb442524a449740db8c1a45a0a185e6a11 |
| SHA256 | 7e4c006654f2986488145e82f65789b915605ac0ee10df2463dbb61cfb134a80 |
| SHA512 | 5a82663ad39dcd43d08e090f8914bb2f34c81e923fa7f2b11cd874feb8d0780b9b33a27e3b961d4f31a1ea5716c3b1174cf2e226b794c7e7c74ffc1e5c5789dc |
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\pad-nopadding.js
| MD5 | 0f26002ee3b4b4440e5949a969ea7503 |
| SHA1 | 31fc518828fe4894e8077ec5686dce7b1ed281d7 |
| SHA256 | 282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d |
| SHA512 | 4290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11 |
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\aes.js
| MD5 | 4ff108e4584780dce15d610c142c3e62 |
| SHA1 | 77e4519962e2f6a9fc93342137dbb31c33b76b04 |
| SHA256 | fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a |
| SHA512 | d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2 |
C:\Program Files\nndannfdnoaiphfcbbpgkhodebpoiocf\js\mode-ecb.js
| MD5 | 23231681d1c6f85fa32e725d6d63b19b |
| SHA1 | f69315530b49ac743b0e012652a3a5efaed94f17 |
| SHA256 | 03164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a |
| SHA512 | 36860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 9d9910d3235a0d983181d713421d7df2 |
| SHA1 | 790a150dc36b8d36a43cf099a5426e5ae550121a |
| SHA256 | 1d5828dc9223962ea6493454a7a7465be02aaeae7932cafe9525faa17ee07d46 |
| SHA512 | 7e53833c046b11d1eb60de521d01262140b38d8e97edefbbb89f6d6924cb179eea1d29bf88a37124810cc840261d4deb6b714b11507b93a4d1fa4b9fb901fe1c |
memory/4484-498-0x00007FFBCDC10000-0x00007FFBCDC11000-memory.dmp
memory/4484-500-0x00007FFBCE1E0000-0x00007FFBCE1E1000-memory.dmp
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
| MD5 | 99914b932bd37a50b983c5e7c90ae93b |
| SHA1 | bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f |
| SHA256 | 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a |
| SHA512 | 27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | 4a56c3cbac6264431e206f4c509d0efd |
| SHA1 | 3e3b9e0a0b97eaff0d083dc8bb64f85821cbfa4c |
| SHA256 | 9daf2d1c8d557e8d7ac8951ad1edfb1f231577a91746ab1787ba9f98e54af94e |
| SHA512 | 1d785f4175ba6730fe0f6da788de7713485219ffad0036d4e98bce65fd6b9e56a1b34a7d25c4c44aa4d0d02d5870e1fa8ceb82152e478fe1c158ac3caafd40bf |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
| MD5 | 191f248b1acee5820bc5f5ca8904a913 |
| SHA1 | d68532f3b06350af7f5c4473d58370ca978536d8 |
| SHA256 | 79fb2ef6ea3f5a51cb359094eb2fc6239e88f828b2a131ac99ef3d04f5fc3d81 |
| SHA512 | a615e3da041ee1c1cfeb39507999bf21fa6c6995c2e6ff5d53d1d8ba6cc3f18b615687b8125f58540505855cd15714fe5fa76340e50869c1b1b14a63414f8d5e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 1ddc0ba8f4cd7d8d5e62d3ace819a860 |
| SHA1 | a5438a626ab0e3e44da0afb97adcd81941852474 |
| SHA256 | 0e3badf05da78d4df6608f76340eda1c9a9efc1727745be3fab456278641131b |
| SHA512 | fd996077586ee82dbabc40034f7af392c16bc7e35386c2fbe77bfb9dd011193bb9baef1673f8373f44c59ca3f1b8befcf1a691ca2128584b9e2a2be419d8c4b5 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 81f2707dfca51d88aa9bea75ecd2d2cc |
| SHA1 | 866366cceb5e36c012fcc2cf93f5940cdf683347 |
| SHA256 | e923d7925f74145189c3bbb4667cff0d0ffac41189a7687ca8bd58e5511de4f0 |
| SHA512 | c802505c749149664bdd1a523927eb77f4ecce8676afc327555558e4534ae0ca97b72d416b17818a98a38151df4a065c75bb349a481be8ed4ffbe9dcc6d6230e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 4b7c4be7b5d5ce3f13fcd4b8bb2b40fd |
| SHA1 | afb05e385f2c5e62f3c7567668b5e78b85316cfe |
| SHA256 | 67ff305dddc1d4db0c6ac71b6e48ab24e1a35286d5117dfeb022c56afe1668eb |
| SHA512 | 182d0a73d5bdcdbbe3431ba1d719859f2f06a5dd8f39b5c3f46cf068c4e73369190dff5d334ca234df41e589b29edb2dd2be89eb154b8fe80604c9b4bea9e1c1 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | cae221ddbdc2db35ae438f75df60389b |
| SHA1 | f27c88570c8976cea5330fc08fcbfc32acab38ff |
| SHA256 | 4d0a9066db75170c810d23ef0a1b969e788093af5f87a2abf98976ea3101bfc8 |
| SHA512 | a85320ae68eb63584d0f91e1fbcd7baf99174b4c1231203a977c69557a5e19b7c3274ab1e3ce326b315dc2a2e1361bc9e624c9ce4e2b562d17e2fca08e12931e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | 08b44521ff61e8b188a3783361cb0668 |
| SHA1 | e9b02634d0e775c21d9f66b06e3ae5510e96a3b2 |
| SHA256 | 0586d8352fe1ca4c791622f7a7e8faae31d45a863b549619483449a90993e301 |
| SHA512 | 3469341f8fabbf52aa768366df976fd7089feb9b6ef0903ee173536e582136050bc04c8039c454d5ca439c5059d3c8d65fda0172aa66cdf9f125afbf8ed290f4 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | b78c031db0e843deae5cfcdaabd5c25e |
| SHA1 | 4f3d7c8e6d0c3b24829867704181a7cb78c0d18d |
| SHA256 | 8b12dfc16799978fbfe5b3261d3ce33834aa0f5d1f1fa1900d471e0482a95627 |
| SHA512 | 016f74850deb197a120373061b640a6cf9cadfe9189f17d1de95b56d97cf5dcc6af5b1ec9e370bbcceff8effff9dc278b5d6dcb5fe3867519005d781e731c0e8 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
| MD5 | 4d0918588764e0e4efea36a31decc015 |
| SHA1 | b91668a3abca1df6482b6a729ed70409bca87df3 |
| SHA256 | e5ab32cdcc2e899065ebe8e8ecdb269ccbdaa3787626f5e623721d2a5fc80d72 |
| SHA512 | 873848322ad7aee63f9a9e4d026e6d259c09a6ff97636c219a2a72aa5847ed80ae290e8312c93972bdddc06c50ecd3cd35d18fa4e0bf6df67a77302ae783863c |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe56f39c.TMP
| MD5 | 0cef53a8cdf6161f29fae480c10ab906 |
| SHA1 | a765c03f6432df1818de5063b65b07825bec3df8 |
| SHA256 | 907311375b570498c700d62a0a447c9dc046cf3311aafd080ea4f17b116b9644 |
| SHA512 | f356c8483b51bcaeeddacb90575ff6b0580f9f9c46715f5461b0eb740b3d02bec40a94f4254e8dd7438b442cf58c18fe5ca7f2b36ec4282f638357c4f08f773f |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | 632241bbb5af92e9d5fe5de14670cf2d |
| SHA1 | cc9973f14f03fa2cca5537d2c20772b43a24779d |
| SHA256 | 1455e4b95ea96aae1ad6209b5f09b6dd161b863d34f647fd807d93f028b20558 |
| SHA512 | 25138e9046e73a7828579537a20ab81683150170c4643ccb3dd4af1c40d006c3cdf1d1d1c3e3418f9d5b7c4f437893689939fb2d76d20edc322555e93eac1ee3 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 872112c56557efd31464f69df1ccfbd0 |
| SHA1 | fbe42b37b009a7fe5948b83316666e652eaa790f |
| SHA256 | 51dfa8a05720e815585901412d22a22a697ad713c0595995d42d4a06871778c4 |
| SHA512 | a3a80c2718c6e5a3d66756121dbf121f96e61c9c66b35cb7cb3afedba4d3605a00c037f2da680bf1d061e7bdc67755dad88c62810206e11831d2874a610e9ec9 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | 099f1349e1f0410e654991ccc9a81d93 |
| SHA1 | eb6734ec8db61301510513dcd136c6405a4a7d0e |
| SHA256 | 2b7de33105a4de1cc720adfe0a68acfd6485ab31d94b354faac37719a5c9144f |
| SHA512 | 3972094d849504febe1fd90a3e9033b6e92b080c872ea6c0aef9321aa4026ff61c407db5de0b78a385aea2aa00a5f87f3ce277a75fd2a26a5fdb9bff699a9c2e |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 96e77e97ed506a34b7047d7a5af1fcd0 |
| SHA1 | d925e533f6e8697dd1ba1cdfdab9607ca7df55d6 |
| SHA256 | b33ed13b44a9c49685171cdc41fe2c03aa5d2a75265135a1453a543143f40f68 |
| SHA512 | 186465d59fed673aeecba3ef665a025c567048549669010ff564e81187129f39833f85b9f3cac9e297d698e83f3d5960fda57ce14f91d11c577c3ebc9fe0b8e2 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | 1ae8a0adfe5e49164c09cd0133d46eb8 |
| SHA1 | abf458f0d3a8f1b95b6fd6f14cef7edc5bc2bda4 |
| SHA256 | 7ca781b2c9b5879dae10e88e47ee4475f74edf304b19a442b1046c2c936a3a04 |
| SHA512 | 1c7a1f84d28ebd6ec6a3a1dbcf120b3694af635eabe8f47fac555374bffe1ff70baa3091c96a10ab2df4e64336d6a8d99d7a80edc601724bd4f2e78699bde004 |
memory/6572-683-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmp
memory/6572-684-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmp
memory/6572-685-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmp
memory/6572-690-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmp
memory/6572-689-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmp
memory/6572-692-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmp
memory/6572-691-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmp
memory/6572-694-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmp
memory/6572-693-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmp
memory/6572-695-0x000001DE3BC10000-0x000001DE3BC11000-memory.dmp