Malware Analysis Report

2025-01-18 09:17

Sample ID 230808-dsxebabh2w
Target 5024-128-0x0000000003A50000-0x0000000003A84000-memory.dmp
SHA256 07fbae42c8aa418318cce754cd3e5049c3fe22778c46273bd7c8f3a5addb1dd7
Tags
logsdiller cloud (tg: @logsdillabot) redline evasion infostealer spyware stealer themida
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

07fbae42c8aa418318cce754cd3e5049c3fe22778c46273bd7c8f3a5addb1dd7

Threat Level: Known bad

The file 5024-128-0x0000000003A50000-0x0000000003A84000-memory.dmp was found to be: Known bad.

Malicious Activity Summary

logsdiller cloud (tg: @logsdillabot) redline evasion infostealer spyware stealer themida

Redline family

RedLine

Stops running service(s)

Downloads MZ/PE file

Loads dropped DLL

Executes dropped EXE

Reads user/profile data of web browsers

Themida packer

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of SetThreadContext

Suspicious use of NtSetInformationThreadHideFromDebugger

Launches sc.exe

Program crash

Enumerates physical storage devices

Unsigned PE

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Modifies system certificate store

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-08 03:16

Signatures

Redline family

redline

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-08 03:16

Reported

2023-08-08 03:19

Platform

win7-20230712-en

Max time kernel

34s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe"

Signatures

RedLine

infostealer redline

Downloads MZ/PE file

Stops running service(s)

evasion

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\mi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cli.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A
N/A N/A C:\Windows\Temp\setup.exe N/A

Reads user/profile data of web browsers

spyware stealer

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A
N/A N/A C:\Windows\Temp\setup.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1936 set thread context of 288 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cli.exe

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2328 wrote to memory of 2268 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2328 wrote to memory of 2268 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2328 wrote to memory of 2268 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2328 wrote to memory of 2268 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2328 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2328 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2328 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2328 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2328 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2328 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2328 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2328 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2268 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 2268 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 2268 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 2268 wrote to memory of 388 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 1936 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1936 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1936 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1936 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1936 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1936 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1936 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1936 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1936 wrote to memory of 288 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1936 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 1936 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 1936 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 1936 wrote to memory of 2884 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 2260 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2260 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2260 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2260 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2512 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2512 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2512 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2856 wrote to memory of 2716 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe"

C:\Users\Admin\AppData\Local\Temp\mi.exe

"C:\Users\Admin\AppData\Local\Temp\mi.exe"

C:\Users\Admin\AppData\Local\Temp\cli.exe

"C:\Users\Admin\AppData\Local\Temp\cli.exe"

C:\Users\Admin\AppData\Local\Temp\cc.exe

"C:\Users\Admin\AppData\Local\Temp\cc.exe"

C:\Windows\Temp\setup.exe

"C:\Windows\Temp\setup.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 108

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x7fef6949758,0x7fef6949768,0x7fef6949778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=31647 --headless --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT" --profile-directory="Default"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --mojo-platform-channel-handle=816 --field-trial-handle=924,i,18206098739166812111,4157237683850592790,131072 --disable-features=PaintHolding /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --first-renderer-process --remote-debugging-port=31647 --allow-pre-commit-input --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1488 --field-trial-handle=924,i,18206098739166812111,4157237683850592790,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1232 --field-trial-handle=924,i,18206098739166812111,4157237683850592790,131072 --disable-features=PaintHolding /prefetch:8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=31647 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1908 --field-trial-handle=924,i,18206098739166812111,4157237683850592790,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=31647 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2412 --field-trial-handle=924,i,18206098739166812111,4157237683850592790,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=31647 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2464 --field-trial-handle=924,i,18206098739166812111,4157237683850592790,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=31647 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2596 --field-trial-handle=924,i,18206098739166812111,4157237683850592790,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=31647 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2764 --field-trial-handle=924,i,18206098739166812111,4157237683850592790,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#syxapd#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=2660 --field-trial-handle=924,i,18206098739166812111,4157237683850592790,131072 --disable-features=PaintHolding /prefetch:8

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Windows\system32\taskeng.exe

taskeng.exe {4687CC80-56C9-4557-923B-AAC947C94AE2} S-1-5-18:NT AUTHORITY\System:Service:

C:\Program Files\Google\Chrome\updater.exe

"C:\Program Files\Google\Chrome\updater.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#syxapd#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"

C:\Windows\System32\conhost.exe

C:\Windows\System32\conhost.exe

C:\Windows\explorer.exe

C:\Windows\explorer.exe

Network

Country Destination Domain Proto
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 transfer.sh udp
DE 144.76.136.153:443 transfer.sh tcp
US 8.8.8.8:53 apps.identrust.com udp
US 2.18.121.70:80 apps.identrust.com tcp
US 8.8.8.8:53 www.microsoft.com udp
NL 104.85.1.163:80 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 ogs.google.com udp
NL 142.250.179.206:443 ogs.google.com tcp
US 8.8.8.8:53 apis.google.com udp
DE 172.217.23.206:443 apis.google.com tcp
US 8.8.8.8:53 play.google.com udp
US 8.8.8.8:53 youtube.com udp
NL 142.251.36.14:443 play.google.com tcp
NL 216.58.214.14:443 youtube.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 i.ytimg.com udp
NL 142.251.36.54:443 i.ytimg.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp
NL 142.250.179.141:443 accounts.google.com udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
DE 172.217.23.194:443 googleads.g.doubleclick.net tcp
DE 172.217.23.194:443 googleads.g.doubleclick.net tcp
DE 172.217.23.194:443 googleads.g.doubleclick.net udp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 yt3.ggpht.com udp
US 8.8.8.8:53 i.ytimg.com udp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.54:443 i.ytimg.com udp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 stratum-eu.rplant.xyz udp
FR 141.94.192.217:17056 stratum-eu.rplant.xyz tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp

Files

memory/2328-55-0x00000000741D0000-0x00000000748BE000-memory.dmp

memory/2328-54-0x0000000000B40000-0x0000000000B74000-memory.dmp

memory/2328-56-0x0000000000340000-0x0000000000346000-memory.dmp

memory/2328-57-0x00000000020B0000-0x00000000020F0000-memory.dmp

memory/2328-58-0x00000000741D0000-0x00000000748BE000-memory.dmp

memory/2328-59-0x00000000020B0000-0x00000000020F0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabAC29.tmp

MD5 3ac860860707baaf32469fa7cc7c0192
SHA1 c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256 d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512 d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

C:\Users\Admin\AppData\Local\Temp\TarAC99.tmp

MD5 4ff65ad929cd9a367680e0e5b1c08166
SHA1 c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256 c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512 f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

\Users\Admin\AppData\Local\Temp\mi.exe

MD5 80b0b41decb53a01e8c87def18400267
SHA1 885f327c4e91065486137ca96105190f7a29d0f9
SHA256 10d8e7a04d05a2690a7e0cc30c10028eda0af680a8787f24cb9668ccbe46e1e1
SHA512 19bd6c9ab0cfbba34e722f508fcb4a99ae78a0d71ef664b186034c78eda09a61ae63455f7958dd5a50ec6432c822b23582ca7c87309a37fcbbb28e5facf56c8e

C:\Users\Admin\AppData\Local\Temp\mi.exe

MD5 80b0b41decb53a01e8c87def18400267
SHA1 885f327c4e91065486137ca96105190f7a29d0f9
SHA256 10d8e7a04d05a2690a7e0cc30c10028eda0af680a8787f24cb9668ccbe46e1e1
SHA512 19bd6c9ab0cfbba34e722f508fcb4a99ae78a0d71ef664b186034c78eda09a61ae63455f7958dd5a50ec6432c822b23582ca7c87309a37fcbbb28e5facf56c8e

C:\Users\Admin\AppData\Local\Temp\mi.exe

MD5 80b0b41decb53a01e8c87def18400267
SHA1 885f327c4e91065486137ca96105190f7a29d0f9
SHA256 10d8e7a04d05a2690a7e0cc30c10028eda0af680a8787f24cb9668ccbe46e1e1
SHA512 19bd6c9ab0cfbba34e722f508fcb4a99ae78a0d71ef664b186034c78eda09a61ae63455f7958dd5a50ec6432c822b23582ca7c87309a37fcbbb28e5facf56c8e

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

memory/2328-152-0x000000000C920000-0x000000000CBAB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

\Users\Admin\AppData\Local\Temp\cc.exe

MD5 858f82fe9166c34b6709a3adfe6a625f
SHA1 63275e4b77e0fe6fa6f1db716b5963b69b68f8a5
SHA256 8ec2c1bb10e05a5129269488b53a46c6b5be3691c61ef7da7c6eecf1c0444b28
SHA512 1338082ebb6bf658125cd6d72f5885c78865c1abbed50fd10317dacaf41a450eb98b949631f1a1b94a67d335b23cfc0fa78d0d8db3d726adf2a57af50307b89e

C:\Users\Admin\AppData\Local\Temp\cc.exe

MD5 858f82fe9166c34b6709a3adfe6a625f
SHA1 63275e4b77e0fe6fa6f1db716b5963b69b68f8a5
SHA256 8ec2c1bb10e05a5129269488b53a46c6b5be3691c61ef7da7c6eecf1c0444b28
SHA512 1338082ebb6bf658125cd6d72f5885c78865c1abbed50fd10317dacaf41a450eb98b949631f1a1b94a67d335b23cfc0fa78d0d8db3d726adf2a57af50307b89e

memory/2328-161-0x000000000CAB0000-0x000000000D0E4000-memory.dmp

memory/2260-164-0x0000000001360000-0x0000000001994000-memory.dmp

C:\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

memory/2268-172-0x00000000035B0000-0x00000000047D6000-memory.dmp

C:\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

memory/288-175-0x0000000000400000-0x0000000000527000-memory.dmp

memory/288-173-0x0000000000400000-0x0000000000527000-memory.dmp

memory/288-186-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/388-180-0x000000013F710000-0x0000000140936000-memory.dmp

memory/2260-185-0x00000000772C0000-0x00000000772C2000-memory.dmp

memory/2328-183-0x00000000741D0000-0x00000000748BE000-memory.dmp

memory/2260-181-0x0000000000190000-0x0000000000200000-memory.dmp

memory/1936-178-0x0000000000DD0000-0x000000000105B000-memory.dmp

memory/2260-171-0x0000000001360000-0x0000000001994000-memory.dmp

memory/388-188-0x000000013F710000-0x0000000140936000-memory.dmp

memory/288-189-0x0000000000400000-0x0000000000527000-memory.dmp

memory/2260-191-0x0000000002E50000-0x0000000002EBC000-memory.dmp

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

memory/288-192-0x0000000000400000-0x0000000000527000-memory.dmp

memory/288-195-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/388-198-0x00000000770D0000-0x0000000077279000-memory.dmp

memory/388-190-0x000000013F710000-0x0000000140936000-memory.dmp

memory/288-196-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2260-200-0x00000000741D0000-0x00000000748BE000-memory.dmp

memory/2260-202-0x0000000002E10000-0x0000000002E50000-memory.dmp

memory/388-197-0x000000013F710000-0x0000000140936000-memory.dmp

memory/288-199-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-201-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2260-207-0x0000000002E10000-0x0000000002E50000-memory.dmp

memory/288-206-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2260-204-0x0000000005450000-0x0000000005502000-memory.dmp

memory/288-203-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-227-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-228-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-226-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-225-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-224-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-223-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-222-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-221-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-220-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-219-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-218-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-217-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-216-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-215-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-214-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/388-211-0x000000013F710000-0x0000000140936000-memory.dmp

memory/288-213-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-212-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2260-210-0x0000000002E10000-0x0000000002E50000-memory.dmp

memory/288-209-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/388-205-0x000000013F710000-0x0000000140936000-memory.dmp

memory/288-208-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-229-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-242-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-241-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-240-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-239-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-238-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-237-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-236-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-235-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-234-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-233-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-232-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-231-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/2260-230-0x0000000002E10000-0x0000000002E50000-memory.dmp

memory/288-248-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-247-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-246-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-245-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-244-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/288-243-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\CrashpadMetrics-active.pma

MD5 03c4f648043a88675a920425d824e1b3
SHA1 b98ce64ab5f7a187d19deb8f24ca4ab5d9720a6d
SHA256 f91dbb7c64b4582f529c968c480d2dce1c8727390482f31e4355a27bb3d9b450
SHA512 2473f21cf8747ec981db18fb42726c767bbcca8dd89fd05ffd2d844206a6e86da672967462ac714e6fb43cc84ac35fffcec7ddc43a9357c1f8ed9d14105e9192

\??\pipe\crashpad_2856_QEEUWHEUWBBWAPSG

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Local Storage\leveldb\MANIFEST-000004

MD5 031d6d1e28fe41a9bdcbd8a21da92df1
SHA1 38cee81cb035a60a23d6e045e5d72116f2a58683
SHA256 b51bc53f3c43a5b800a723623c4e56a836367d6e2787c57d71184df5d24151da
SHA512 e994cd3a8ee3e3cf6304c33df5b7d6cc8207e0c08d568925afa9d46d42f6f1a5bdd7261f0fd1fcdf4df1a173ef4e159ee1de8125e54efee488a1220ce85af904

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Local Storage\leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Local Storage\leveldb\LOG

MD5 bda401d8a99c2bfa7384b27d91bdaf6b
SHA1 3ae2953d01d650f36cf6386d062fb2ce6beb48c7
SHA256 eb78a42ce6f6cc1c28998266a6746d30631fb283da22f13d4d2c89aab92c6756
SHA512 c5ac56ac264e2089faaea08ada1cfe5184fee6b2767746ed4f20bfe64ce51a8765081c34bf77eaaffa250560acc04331f6ef6b5e40f150e754b2f356dd10d0a8

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Local Storage\leveldb\LOG.old

MD5 04426290c7712a5cbf253ab93ddaf201
SHA1 1d3ff9ef22c8481a14a89cee64c33fe2a3e49253
SHA256 59504130a3354ab475799627fed99337361bedf88ae2cb28f5e07bf5c698a649
SHA512 008fecf9035fa6355cd57330773179d477f7ce89a22f3df4b2966d0298a73370b8a3248b486d53e99d2c32b929b0a17388907362168f30a3a5dbe84ce1cacbb9

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Local State

MD5 b433dd86312281aa36b034760f455700
SHA1 0a844cddc930b49a7a0c27145706593c5e65e43d
SHA256 12e04c9d398245584c87fa93f41bc7302ad1932379aa3a0b862ade6f1a489d80
SHA512 d64769c9abee444cdade4ca7e81b54c6884cfb6eb80a4274bf6e28cf29bcdf587710c95334a837eb7ac06852560304f3a881697fdda6093928a266289d375264

memory/1936-340-0x0000000000DD0000-0x000000000105B000-memory.dmp

memory/2260-341-0x0000000001360000-0x0000000001994000-memory.dmp

memory/2268-342-0x00000000035B0000-0x00000000047D6000-memory.dmp

memory/388-343-0x000000013F710000-0x0000000140936000-memory.dmp

memory/2260-347-0x0000000002F00000-0x0000000002F42000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Network\Cookies

MD5 c9ff7748d8fcef4cf84a5501e996a641
SHA1 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA256 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512 d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

memory/388-349-0x00000000770D0000-0x0000000077279000-memory.dmp

memory/2260-350-0x00000000741D0000-0x00000000748BE000-memory.dmp

memory/2260-358-0x0000000002E10000-0x0000000002E50000-memory.dmp

memory/1700-361-0x00000000026B0000-0x0000000002730000-memory.dmp

memory/1700-363-0x000000001B180000-0x000000001B462000-memory.dmp

memory/1700-364-0x0000000002250000-0x0000000002258000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Session Storage\CURRENT~RFf7723c6.TMP

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

memory/1700-379-0x000007FEF3710000-0x000007FEF40AD000-memory.dmp

memory/2260-382-0x0000000002E10000-0x0000000002E50000-memory.dmp

memory/2260-383-0x0000000002E10000-0x0000000002E50000-memory.dmp

memory/1700-381-0x00000000026B0000-0x0000000002730000-memory.dmp

memory/1700-380-0x00000000026B0000-0x0000000002730000-memory.dmp

memory/1700-384-0x000007FEF3710000-0x000007FEF40AD000-memory.dmp

memory/1700-385-0x00000000026B0000-0x0000000002730000-memory.dmp

memory/1700-390-0x000007FEF3710000-0x000007FEF40AD000-memory.dmp

memory/2260-404-0x0000000002E10000-0x0000000002E50000-memory.dmp

C:\Windows\system32\drivers\etc\hosts

MD5 2b19df2da3af86adf584efbddd0d31c0
SHA1 f1738910789e169213611c033d83bc9577373686
SHA256 58868a299c5cf1167ed3fbc570a449ecd696406410b24913ddbd0f06a32595bd
SHA512 4a1831f42a486a0ad2deef3d348e7220209214699504e29fdfeb2a6f7f25ad1d353158cd05778f76ef755e77ccd94ce9b4a7504039e439e4e90fa7cde589daa6

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 caf02d8ad5f6475655d7de32045b3a06
SHA1 927375f78f0a87ac41b29fa37c30fa339dbefc34
SHA256 be5d7f661809b6ef7debebab33b9bc5a34dd8303e9d9044e3faefb176cfc17a1
SHA512 5cb91fb6cc45c69b22d3f534478f47c4d05bc11307948b90e3399504001d388b41f3d0f9eaee279f33a43b338d0a42974b79038b8590696d7799490c27fff8bd

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G31BNB2QA82KNRRQVM7X.temp

MD5 caf02d8ad5f6475655d7de32045b3a06
SHA1 927375f78f0a87ac41b29fa37c30fa339dbefc34
SHA256 be5d7f661809b6ef7debebab33b9bc5a34dd8303e9d9044e3faefb176cfc17a1
SHA512 5cb91fb6cc45c69b22d3f534478f47c4d05bc11307948b90e3399504001d388b41f3d0f9eaee279f33a43b338d0a42974b79038b8590696d7799490c27fff8bd

memory/1432-471-0x0000000001F00000-0x0000000001F08000-memory.dmp

memory/1432-470-0x00000000023F0000-0x0000000002470000-memory.dmp

memory/1432-469-0x000000001B170000-0x000000001B452000-memory.dmp

memory/1432-468-0x000007FEF36A0000-0x000007FEF403D000-memory.dmp

memory/1432-474-0x00000000023F0000-0x0000000002470000-memory.dmp

memory/1432-473-0x00000000023F0000-0x0000000002470000-memory.dmp

memory/1432-472-0x000007FEF36A0000-0x000007FEF403D000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000002.dbtmp

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

memory/1432-500-0x000007FEF36A0000-0x000007FEF403D000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\7a3c61e2-22ed-4c3d-bdbc-2fc86f736847\index

MD5 54cb446f628b2ea4a5bce5769910512e
SHA1 c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256 fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA512 8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

C:\Windows\Temp\setup.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 ff4a99a95f9c559a60a7968225accae3
SHA1 bd1943432d9b64314f08840f2e0dc09f162478e2
SHA256 55a32a6aaee8f97bad8d20a1e3a600632f88288524b9b2b12eee4fe035078fb4
SHA512 7e3d0fdeebb3909e5d17c0c0aeffcc5ceb9a192a66fa3a8a82b4a4e86c2bdfe0e24e59ab2010e70551b3a818ebcca7fb9296a0cd6cb2484ff736f354396a685b

memory/388-549-0x00000000770D0000-0x0000000077279000-memory.dmp

memory/388-556-0x000000013F710000-0x0000000140936000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 dfe54f19a24c1c40d6d7cdc68b1fd375
SHA1 441c687115bd448e715a6ffba88480f9173367f5
SHA256 2fced693405d87739e8af24fa53173a5229fcf0e1f3d36127026db1b34df6cf5
SHA512 278df167d85dafe47bc45420e1ca1b0caf393347827d09c3a9f4e8fea1a1a335037351088bb781ac9fb4344bdc8dd9d9507f589b4bf4d97c7e7abe654d620a7b

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\DawnCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\DawnCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\DawnCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

\Program Files\Google\Chrome\updater.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

memory/1904-719-0x000000013F430000-0x0000000140656000-memory.dmp

C:\Program Files\Google\Chrome\updater.exe

MD5 84741bc02d2e9226a943aa03b6a4568d
SHA1 617d01316011faf77fba30d49ae1e86ff988380a
SHA256 fa1f99fdd5beab9a996ff3cb58886dc1811fd6e1ba444aee2d80d0d9b9d5ec93
SHA512 1c95842c88f7d17a07fa2480281cbdff27136525c80a00387536a0843e040adcac37fd13166ab7f48398d28fd297c92d5c0d0ef4066e68297ea9f30179754379

memory/2140-724-0x00000000770D0000-0x0000000077279000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Code Cache\js\538c87078bedf74f_0

MD5 856a283dc2f34308ba63d05f0c06beae
SHA1 4f35a92cfb30baae76b8e9d5c22c6df3301f8089
SHA256 0cb20b4995739aeca6e87b195341f6c9b98bd6335c0d146f212f81c948782b40
SHA512 7d8f0b1d1525a64d5c311d1d4df92454d86ffb90f080b2af95b47e1ba195327262886f71eb60628939370e0d6eafcdeeb0bbbc53dbd411d7c4d4519a58d7670c

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Code Cache\js\43b643866767c5e0_0

MD5 9a69db0129145dada3cb96fe985831ec
SHA1 06afdee2e76b4a4eef72245a89f31322ff07e919
SHA256 d5883cb65ff6d8605360eda630972fada1caf4be40dd60c44c4f87ca4b988c25
SHA512 2994865ae2a340da4337cdd8737a0053e2a7bbf2096e63e99a9b8580984ca879407579d89d3d85bf45071d5bc78ef3f482ee05d6e22c6f243749d599719b0713

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\DevToolsActivePort

MD5 2ea5cb9557853c6d778ae8ff275ba25a
SHA1 da6d9b0da845a8beab8602a8c03974f1bfa58056
SHA256 da3e21d13e84173ad15a86fc2bfca8e77c4d73abc4ffad41e8405849f659998c
SHA512 7c2206d96a343d47ef64cf7a567a4916459486865a5a3cb41b17a287d76c81de60481fef8d031afda9b1bf0d451e7113682ab0a7c2f1840c9425e0f1cb4e2b24

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Crashpad\settings.dat

MD5 a81d647e490ddc052cedf6bec7052e14
SHA1 fb8d5d68cca3c6defc7a9a914b9128a5daee3f7c
SHA256 ff673590ce958ed69d58b3e8e293851300662756f8d856a63a68080b13159239
SHA512 ce1af2b67b8a2f5dd8d9f0f66bec881c60a7d0d8f1a2c4cd68c1cd4eb32234f44a1a1dc546f65579ce62c8ba1b8c40937bdba62d9629f37e36906a62f270dde9

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_000004

MD5 268f371a3c8309c91ba4f7dd430f6c8a
SHA1 62f4de9d9f2f3c063de8e871b407d728f7512b32
SHA256 6cbfbf9ce8372c0fb33b55824161846dfcecba92b7bed67afb6dbeaf974733e8
SHA512 f11e8a17b91576a339a35ba9382de0eeb783ef26254db74644c3f20c621a04ab57c19f776687ca602fe6d5043f8dc3be0faee8447ea7afc3b751e731493d39f5

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_000003

MD5 da4cec20c30abd49c5b03cb178c6e5f7
SHA1 c7a0efa3f505a46e5e5001e4fccbef753f52c119
SHA256 11a703e00e1246b141133c860527146c54979728745aaa1858c20d819144f56a
SHA512 60279e6b06b7d8994c1abc2e75617ff39562fcdcfb4b3d693d5db6b18e05eaea3bec033857bf1dc357a8e9b5228fbf272efd034f048ce4cefb6b005e18e0d26e

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_000002

MD5 44d12dc4a3dc874f8c0182d8113c1590
SHA1 0c5b2dbac5f5265cb045373939890c5ea265af80
SHA256 14c577cbf6a8fbfc3a023adc135a59d45024566b909ee3482e058cf01f600f3a
SHA512 9e532617e92005a3b21f8b64a421326519f28c6146676ad9b4c8e4f2fa059abb1d5c8abde28c23ac1d1750641a0007da7caab34d58abeef039d87f9fde82b0e4

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\data_3

MD5 69c2a93f20a67509c3e7d97e230ac687
SHA1 1fcada7ab77e6bed508d8e6b4a1bcd88f946c181
SHA256 88667d81d3087a5b7b5c08ddda04faf1bd1cc8c3f90dab5aa15a948c06263f9e
SHA512 3d38df10bc37810163bcfe0f8067d6ede28d53ede1f27be2fbfd96187bd421d27591d7cbb67f421ed8f5cd7535f10e23c9087b4a2b5330aa8e10ab05c6fc5355

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Code Cache\js\408242ca35bda2b3_0

MD5 60286be8e55d405b5f4028218b91e317
SHA1 d0ab5994935961c0c39d06cc2564a046e9eeb77f
SHA256 65c5ccac8ced6313ce28c7f2bf1d6baf757f5200e944e7c525213b0a6d9a8e5f
SHA512 918abd918bcde4cbbec1f420e8ad9135d1456a22eba50e68a0aa49ade497bd1f8e9867fd21fe7148bc24c16880c4a2610d1a9968a753125a416f378a7e36cebb

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Code Cache\js\3978e55ddeca1efa_0

MD5 29d7550d6d1d5101a07b8cd8f99b2ed8
SHA1 675917884a88ed468e7754f01a2edab20e17737e
SHA256 66cdb6cb64a627d7e38d329a5d3911a933bfb2feafad740abf9dcf7bd3cb90d1
SHA512 37ac078e4b4f4b6e8fc1fa90a62145b771e0f6c86a343bc6223c5731d5ccc868b8d2b9af52fb9785ce6c0448f51890ef7bcaaac230d677e63f91c76ee2f50235

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Code Cache\js\2e64514b9cd267ab_0

MD5 3c890d6ba6b4a6f2cbe8e0f7a615f6e2
SHA1 010010de1deb70dfe6214830e9c98c68beb8cad9
SHA256 afefa578ebe68782c0d74b9b5268ed4cdf8c72e0e5850aa40e4df59f0642dfe9
SHA512 4bfb991b38e376aa101894c638f1f34e9cf151af08287090fb2c3052793fdbd1c91b8b6512a27588d936f87e0a47c598927703b958dd51597d8672308acd02bc

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Code Cache\js\046ee432e29f33b8_0

MD5 1f4bd22f98f3e9ec827ef76d02256d5c
SHA1 620c3ebb9763d6c15fc6f88e444d51757933f8d5
SHA256 e011b8dff9a8b52413a76e7d9a7e56e55dee82a85189d81e419d65a70df204d4
SHA512 ad9d1fd82cadf179f0756dc0ece5cce724adb1d0a573861f6efdecf2cbfe28576e44517813f8f878ef19f15f8c18ce4e06a3aab684366dcefcd0400168e02b46

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Code Cache\js\0268938681f021db_0

MD5 1e6c879e0513f29240dd73076746de79
SHA1 59c0280f0705ac409ba34060cbaa338c2c60e0dc
SHA256 f960726583fd10566249ed1403552c28dd263f6e7eb789a5a672d226b435ed64
SHA512 896ee07adc896e3a0e44a289da1d2c9fba09cf7b481462f54dc1ab3e4417042950b32dbdf269c70ca2e3bd9f916358d11a5e1a32a2e49c90610c95dcbeea7311

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\index

MD5 885eee01f98f146d1e8db1866d012b11
SHA1 9cf07e0d1092fc12e3409ea3957841e56e287f3c
SHA256 813d0fc78d386f32fd0ce895a6fd15a3f2c0f1695b00d636acd0f181109bfbcf
SHA512 9a419237ede2a845d1a71b3ce48ffdd7e145ee800d1916699bbdd4468381a621b268def9cc74f47ab3b7907f86b701ec884f345eb9d893790825dccfccf5f4e0

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_000011

MD5 756363021913fd020eca683378e738ba
SHA1 68eb4e73028fc32006cbf8d916382117fdb97eb3
SHA256 aa4f958e26306b023d35d6f0fa825a6a230fb7fd847f2782219e4cab761b7814
SHA512 93a89b8943f9eceef65aef014407056745d3d3f0fc08633e7dff9ce3839572aadc0b5891c97366fea8c069c125c76fd53715dca2b98615813fc3687e6fcc2275

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_000010

MD5 38b91a0dfabb3c909a65ce5a6e166f6a
SHA1 43d1d204b87533bccf6a10240f52de358a2e7bfa
SHA256 503db234a18ee03ce06d5326253cbd38ca564657ac868f8a4f30f090ae11830b
SHA512 d595468fa545a47008f6f7fd2a0601805a0c262f657e43f2d0305fae2b72add12b99fce08a4ed412eb208a4262bde6c439e190c16a588b9c606222c46e1d8bd1

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_00000f

MD5 789fd4f17cc11ac527dc82ac561b3220
SHA1 83ac8d0ad8661ab3e03844916a339833169fa777
SHA256 5459e6f01b7edde5f425c21808de129b69470ee3099284cb3f9413d835903739
SHA512 742d95bb65dcc72d7ce7056bd4d6f55e2811e98f7a3df6f1b7daef946043183714a8a3049b12a0be8ac21d0b4f6e38f7269960e57b006dfec306158d5a373e78

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_00000e

MD5 db2bafd5a7299458ee228a5f55cafe46
SHA1 495b0477fc5af81b0106cd2e6bda8c80d818095a
SHA256 05cb8f3ad6c20f5a1ffe392b285749c857a8194ed761dfe4a62ce85a02102043
SHA512 8afb1abaccb447157d3045873ee9ec92d6858ce828b8a637d760d38561302e31e79e408d2bad51585a6585bdf0a4b72652e5e6e5799d4f3d171b120d1aba26bb

memory/2260-782-0x00000000741D0000-0x00000000748BE000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_00000d

MD5 189badc72a668aade50699ae05067c2a
SHA1 5458410fc96bcf08b29f204b05470dad5882afb9
SHA256 896d76b06fe7bc62fa10e8f9091b84584d8fdbd7eaaea1183f7c1e5e3a98c559
SHA512 287ff71f9b6ab261f989792cfee0b99e1745c57e8e8c9c3c55e07592a835008673a9ee5b2099ef9beb6ef4343c10827109b281b2fbed0fe0de1da020723c622b

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_00000c

MD5 27cd2cadf2c6803021503d69ef6adb59
SHA1 42db3241dceb8e751bc394963be6c3a600c63438
SHA256 d1b75085ea35b7053cf99dcd0764c28eb035f1228ca2fa4393040a0f1f4e3927
SHA512 6f1862d0cf21c62bc047ebcf66fdabe392c18e3a4534206941fa9ccf0e155c51b1dac0d1409b2283de08fe22782b5d8f48d8956fd33c6e0ccb006a8a9f4acfec

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_00000b

MD5 9f1c899a371951195b4dedabf8fc4588
SHA1 7abeeee04287a2633f5d2fa32d09c4c12e76051b
SHA256 ba60b39bc10f6abd7f7a3a2a9bae5c83a0a6f7787e60115d0e8b4e17578c35f7
SHA512 86e75284beaff4727fae0a46bd8c3a8b4a7c95eceaf45845d5c3c2806139d739c983205b9163e515f6158aa7c3c901554109c92a7acc2c0077b1d22c003dba54

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_00000a

MD5 355dcc3d527c3e9cee6ad0819e479211
SHA1 2e31ed9f7f6214bcc6419de03438c6613357ce56
SHA256 2096b2907f5170ec6a2eb2a418547e187f0e9e03ebd1b4fcf97c948acfb07f7c
SHA512 d61d48c09735e749a7448ac05c577fabdd0b3508aff5acfbd256d141c9dedd209263ecc9d3ef0bfcf80dc83e64115530dba88c608c43f96ec3df366c24a983eb

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_000009

MD5 99374f3368b192f0ebb50e2ec284e2eb
SHA1 9415121c85654b2bf0a98576c11589ff304665c9
SHA256 85e81bcb282f3c74de592b44362f4adc0271e43743de6bd3c984e59c840d7f28
SHA512 582886a6ff12929ae865e2ceba30e96d0e5a77e2a09b6ba130f2416fc6ac544bc2bd2337df145dabbcae84d13a67e9922a0890c77c40b06149d562116b35a311

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_000008

MD5 7d75a9eb3b38b5dd04b8a7ce4f1b87cc
SHA1 68f598c84936c9720c5ffd6685294f5c94000dff
SHA256 6c24799e77b963b00401713a1dbd9cba3a00249b9363e2c194d01b13b8cdb3d7
SHA512 cf0488c34a1af36b1bb854dea2decfc8394f47831b1670cab3eed8291b61188484cc8ab0a726a524ecdd20b71d291bcccbc2ce999fd91662aca63d2d22ed0d9f

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_000007

MD5 d453afffdfdc0b4a8dade7dc8c9572d6
SHA1 58059302d94ed9744e739e388d24bde852996908
SHA256 9c34eeebfce83033015f38c7a605d1fed811fb54720409bfe06ad5c2c91fe2d1
SHA512 2678c762ac65b5edebd1ae552e061495f551a4d037d0dfd0732c98c3e197e498a1b020c927e11f2c3dbd388dcd863f83990632581582e20767b8bb1a0b0f6927

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_000006

MD5 9f6f4f647554a511bdd50a3b723a78c8
SHA1 ed8344f4ba46449cd30587506bba8f6b0ec7a0ce
SHA256 4e1e1737b5ea13666aa70d664f493092c1c4c3d2934ae3b12d6470e14ebbc898
SHA512 c369e746a0882887a1f2d07fe27e2270dd10be95e01c54ea588ed3289c691a67aa7656033a647c69d6b594f401c4b02c2bb40e7b87c1d583effaee491b09d881

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\f_000005

MD5 500ecdda9ad3e919a1f41c1588266a1b
SHA1 d5ddf92dc08284a48701a4d3555590bda05f77e0
SHA256 caad3feace9086d27e006d538d2daf4dd50e2b33307232a7db6d5f8c48f73b37
SHA512 5e47a0d0721ec0f9adb5a439ffc98c1b4da780e74270332313f8350f228bdb919d32c4812c6ede84ebae3ead1342c2eaf4c73f4dfca5a87e8887e1b5913c0d9f

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\data_2

MD5 0a31f4c927c6dc1054f7b1c917a0fba5
SHA1 2c24afe05151e9fddfc6e1f9a340f28fe977e642
SHA256 4fd5b0aed28d5cde6188a51c2d2f1c260c074d94e1ed62be8ddbca8aaf3c911d
SHA512 2d935ec5301411d19d82cfdc6f5fd7d90a09834ca24c36cc1ec76a4808df23cf32b3088daba0bc9c4f993d0f09d26324e51c88e18fe8212a46006c4e1a95ab84

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\data_1

MD5 47452d092bb2e8b13a06a4b017a4ed5b
SHA1 e97d43869dba37e1c5749e4a82a209ebf967adc3
SHA256 0739d5abafb2a9cc0c7c5275e43faa4443bda5bd5ae77eed856e9ac1b848875c
SHA512 73512ea30b907480271fae9d1bd56ae1c64d2f3626edb9d9be1bfc8e67bf93110b5e414216cac3c64968375088edb6e24b2368802dfabc7ce87256dda5d1b8d4

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\Cache\Cache_Data\data_0

MD5 bb4a55c93245c08e533137e7b8c236f7
SHA1 a0bd763396d358fc6a06a65bac33a94fc40339d9
SHA256 878a57dd27e694318a11bcb1cc44672d1c51bd2a7666cf9b7ce97c99b391bc0e
SHA512 d64d7e5c6ddcdd14f67e125ac49d8acaee8cefd59454465bfd7af4251501a7ae8b88548a04d054431263ff2888a119ed26cc3ffa82297aa1513aa2bed2ca2de0

C:\Users\Admin\AppData\Local\Google\Chrome\User DataXKCUT\Default\chrome_debug.log

MD5 da8013bd3945881a7cf0e9197de94f01
SHA1 fa162875388499604330ae0d36a7c8d70b719c47
SHA256 cfa0bd5abab72b580c2e0bf457bf059fcde6254edbcff1b63dc2712d77739171
SHA512 bb528610ad7104dc04b1d4ee998a2922edf5a030c8b8037a71bd0e2301016d7ba8cb8aca6abe7c2ac467b028b8a9082a9e34bbfb0f64454be727497c74e35266

memory/2140-788-0x000000013F430000-0x0000000140656000-memory.dmp

memory/2140-790-0x00000000770D0000-0x0000000077279000-memory.dmp

memory/2252-793-0x000007FEF5330000-0x000007FEF5CCD000-memory.dmp

memory/2252-792-0x0000000019AE0000-0x0000000019DC2000-memory.dmp

memory/2252-795-0x0000000000450000-0x0000000000458000-memory.dmp

memory/2252-794-0x00000000010F0000-0x0000000001170000-memory.dmp

memory/2252-796-0x00000000010F0000-0x0000000001170000-memory.dmp

memory/2252-797-0x00000000010F0000-0x0000000001170000-memory.dmp

memory/2252-798-0x000007FEF5330000-0x000007FEF5CCD000-memory.dmp

memory/2252-799-0x00000000010F0000-0x0000000001170000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-08 03:16

Reported

2023-08-08 03:19

Platform

win10v2004-20230703-en

Max time kernel

124s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe"

Signatures

RedLine

infostealer redline

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\5024-128-0x0000000003A50000-0x0000000003A84000-memory.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
NL 209.250.248.11:33522 tcp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 11.248.250.209.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

memory/3884-136-0x0000000074890000-0x0000000075040000-memory.dmp

memory/3884-137-0x0000000000290000-0x00000000002C4000-memory.dmp

memory/3884-138-0x000000000A770000-0x000000000AD88000-memory.dmp

memory/3884-139-0x000000000A260000-0x000000000A36A000-memory.dmp

memory/3884-141-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

memory/3884-140-0x000000000A180000-0x000000000A192000-memory.dmp

memory/3884-142-0x000000000A1E0000-0x000000000A21C000-memory.dmp

memory/3884-143-0x0000000074890000-0x0000000075040000-memory.dmp

memory/3884-144-0x000000000A4F0000-0x000000000A566000-memory.dmp

memory/3884-145-0x000000000A610000-0x000000000A6A2000-memory.dmp

memory/3884-146-0x000000000B340000-0x000000000B8E4000-memory.dmp

memory/3884-147-0x000000000A6B0000-0x000000000A716000-memory.dmp

memory/3884-148-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

memory/3884-149-0x000000000AF10000-0x000000000AF60000-memory.dmp

memory/3884-150-0x000000000BC60000-0x000000000BE22000-memory.dmp

memory/3884-151-0x000000000CC70000-0x000000000D19C000-memory.dmp

memory/3884-153-0x0000000074890000-0x0000000075040000-memory.dmp