Malware Analysis Report

2025-01-18 07:59

Sample ID 230812-qkfstadg9x
Target 1732-62-0x0000000003520000-0x0000000003554000-memory.dmp
SHA256 fd9b412b4eb939d04b054b7e35ad32c43e9d7bfcd1099ef9f4428fddd97f7c31
Tags
redline logsdiller cloud (tg: @logsdillabot) evasion infostealer spyware stealer themida
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fd9b412b4eb939d04b054b7e35ad32c43e9d7bfcd1099ef9f4428fddd97f7c31

Threat Level: Known bad

The file 1732-62-0x0000000003520000-0x0000000003554000-memory.dmp was found to be: Known bad.

Malicious Activity Summary

redline logsdiller cloud (tg: @logsdillabot) evasion infostealer spyware stealer themida

RedLine

Redline family

Suspicious use of NtCreateUserProcessOtherParentProcess

Stops running service(s)

Downloads MZ/PE file

Drops file in Drivers directory

Loads dropped DLL

Reads user/profile data of web browsers

Executes dropped EXE

Themida packer

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of SetThreadContext

Suspicious use of NtSetInformationThreadHideFromDebugger

Drops file in System32 directory

Launches sc.exe

Unsigned PE

Program crash

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Modifies system certificate store

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-08-12 13:18

Signatures

Redline family

redline

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-12 13:18

Reported

2023-08-12 13:21

Platform

win7-20230712-en

Max time kernel

60s

Max time network

150s

Command Line

C:\Windows\Explorer.EXE

Signatures

RedLine

infostealer redline

Suspicious use of NtCreateUserProcessOtherParentProcess

Description Indicator Process Target
PID 468 created 1256 N/A C:\Windows\Temp\setup.exe C:\Windows\Explorer.EXE
PID 468 created 1256 N/A C:\Windows\Temp\setup.exe C:\Windows\Explorer.EXE
PID 468 created 1256 N/A C:\Windows\Temp\setup.exe C:\Windows\Explorer.EXE
PID 468 created 1256 N/A C:\Windows\Temp\setup.exe C:\Windows\Explorer.EXE

Downloads MZ/PE file

Drops file in Drivers directory

Description Indicator Process Target
File created C:\Windows\System32\drivers\etc\hosts C:\Windows\Temp\setup.exe N/A

Stops running service(s)

evasion

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\mi.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cli.exe N/A
N/A N/A C:\Windows\Temp\setup.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A

Reads user/profile data of web browsers

spyware stealer

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Program Files\Google\Chrome\updater.exe N/A
File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Windows\Temp\setup.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2548 set thread context of 1644 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cli.exe

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\cc.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Google\Chrome\updater.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\powercfg.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\powercfg.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\powercfg.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\powercfg.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2404 wrote to memory of 372 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2404 wrote to memory of 372 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2404 wrote to memory of 372 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2404 wrote to memory of 372 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\mi.exe
PID 2404 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2404 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2404 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 2404 wrote to memory of 2548 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\cli.exe
PID 372 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 372 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 372 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 372 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\mi.exe C:\Windows\Temp\setup.exe
PID 2404 wrote to memory of 1304 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2404 wrote to memory of 1304 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2404 wrote to memory of 1304 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2404 wrote to memory of 1304 N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe C:\Users\Admin\AppData\Local\Temp\cc.exe
PID 2548 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2548 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2548 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2548 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2548 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2548 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2548 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2548 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2548 wrote to memory of 1644 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2548 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 2548 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 2548 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 2548 wrote to memory of 1628 N/A C:\Users\Admin\AppData\Local\Temp\cli.exe C:\Windows\SysWOW64\WerFault.exe
PID 1304 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1304 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1304 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1304 wrote to memory of 2108 N/A C:\Users\Admin\AppData\Local\Temp\cc.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1780 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1780 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1780 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2108 wrote to memory of 1640 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe"

C:\Users\Admin\AppData\Local\Temp\mi.exe

"C:\Users\Admin\AppData\Local\Temp\mi.exe"

C:\Users\Admin\AppData\Local\Temp\cli.exe

"C:\Users\Admin\AppData\Local\Temp\cli.exe"

C:\Windows\Temp\setup.exe

"C:\Windows\Temp\setup.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Users\Admin\AppData\Local\Temp\cc.exe

"C:\Users\Admin\AppData\Local\Temp\cc.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 108

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=41818 --headless --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD" --profile-directory="Default"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x7fef66b9758,0x7fef66b9768,0x7fef66b9778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --mojo-platform-channel-handle=808 --field-trial-handle=1004,i,5202306612175684435,13200388733520641786,131072 --disable-features=PaintHolding /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1208 --field-trial-handle=1004,i,5202306612175684435,13200388733520641786,131072 --disable-features=PaintHolding /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --first-renderer-process --remote-debugging-port=41818 --allow-pre-commit-input --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1520 --field-trial-handle=1004,i,5202306612175684435,13200388733520641786,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=41818 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1864 --field-trial-handle=1004,i,5202306612175684435,13200388733520641786,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=41818 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2036 --field-trial-handle=1004,i,5202306612175684435,13200388733520641786,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lwilj#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=41818 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2544 --field-trial-handle=1004,i,5202306612175684435,13200388733520641786,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=41818 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2664 --field-trial-handle=1004,i,5202306612175684435,13200388733520641786,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=41818 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2788 --field-trial-handle=1004,i,5202306612175684435,13200388733520641786,131072 --disable-features=PaintHolding /prefetch:1

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1900 --field-trial-handle=1004,i,5202306612175684435,13200388733520641786,131072 --disable-features=PaintHolding /prefetch:8

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Windows\system32\taskeng.exe

taskeng.exe {6E4B03DD-9334-4E19-966F-7D7E25E57698} S-1-5-18:NT AUTHORITY\System:Service:

C:\Program Files\Google\Chrome\updater.exe

"C:\Program Files\Google\Chrome\updater.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lwilj#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"

C:\Windows\System32\conhost.exe

C:\Windows\System32\conhost.exe

C:\Windows\explorer.exe

C:\Windows\explorer.exe

Network

Country Destination Domain Proto
PL 51.83.170.21:19447 tcp
US 8.8.8.8:53 transfer.sh udp
DE 144.76.136.153:443 transfer.sh tcp
US 8.8.8.8:53 apps.identrust.com udp
NL 88.221.25.153:80 apps.identrust.com tcp
US 8.8.8.8:53 www.microsoft.com udp
NL 104.85.1.163:80 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
US 8.8.8.8:53 youtube.com udp
NL 216.58.214.14:443 youtube.com tcp
US 8.8.8.8:53 i.ytimg.com udp
NL 142.251.36.54:443 i.ytimg.com tcp
US 8.8.8.8:53 ogs.google.com udp
NL 142.250.179.206:443 ogs.google.com tcp
US 8.8.8.8:53 apis.google.com udp
US 8.8.8.8:53 accounts.google.com udp
DE 172.217.23.206:443 apis.google.com tcp
NL 142.250.179.141:443 accounts.google.com tcp
DE 172.217.23.206:443 apis.google.com tcp
NL 142.250.179.141:443 accounts.google.com udp
US 8.8.8.8:53 play.google.com udp
NL 142.251.36.14:443 play.google.com tcp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
NL 142.250.179.194:443 googleads.g.doubleclick.net tcp
NL 142.251.36.14:443 play.google.com udp
NL 142.250.179.194:443 googleads.g.doubleclick.net udp
NL 142.251.36.14:443 play.google.com udp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 142.251.36.54:443 i.ytimg.com udp
US 8.8.8.8:53 yt3.ggpht.com udp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
N/A 127.0.0.1:41818 tcp
US 8.8.8.8:53 stratum-eu.rplant.xyz udp
FR 141.94.192.217:17056 stratum-eu.rplant.xyz tcp
N/A 127.0.0.1:41818 tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
N/A 127.0.0.1:41818 tcp
N/A 127.0.0.1:41818 tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp
NL 104.85.1.163:443 www.microsoft.com tcp

Files

memory/2404-53-0x0000000073F10000-0x00000000745FE000-memory.dmp

memory/2404-54-0x0000000000E90000-0x0000000000EC4000-memory.dmp

memory/2404-55-0x0000000000470000-0x0000000000476000-memory.dmp

memory/2404-56-0x0000000004850000-0x0000000004890000-memory.dmp

memory/2404-57-0x0000000073F10000-0x00000000745FE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Cab283B.tmp

MD5 3ac860860707baaf32469fa7cc7c0192
SHA1 c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256 d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512 d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

C:\Users\Admin\AppData\Local\Temp\Tar2918.tmp

MD5 4ff65ad929cd9a367680e0e5b1c08166
SHA1 c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256 c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512 f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a97fc118a3e94aef592b31effa473cb3
SHA1 7488e3dcf67529276f79207ffb3f169ba7155788
SHA256 9873bfa511791c0fe49baa50cc9701ecec80fe11684f04d069bf072a1fdc96c7
SHA512 766ff28df3fc88d378a60049f119f8fd727528e13ac5e6d5d6f9f5f9fdee6e880705f4eb131e0584a9a315d09ea8ca0a6b234e7adc87653d53c5017ec63e4d3f

\Users\Admin\AppData\Local\Temp\mi.exe

MD5 aba23d7f60f40f4dee64fa440d5db6e6
SHA1 dde62462dc7887a6b3ba193eafb50da17ef40e67
SHA256 6398817cc923cfad6178c53c6ba9da1f30c426cd183bfdf86889faba8b4732d6
SHA512 ad89270a47e292c931f47da322c055e168b0c4e28de69a20cbf42db9e60fbd59ceb02c01d1c18b1c931d0f23d19230b1c6390d98f36048a3c581b78ffe75ce40

C:\Users\Admin\AppData\Local\Temp\mi.exe

MD5 aba23d7f60f40f4dee64fa440d5db6e6
SHA1 dde62462dc7887a6b3ba193eafb50da17ef40e67
SHA256 6398817cc923cfad6178c53c6ba9da1f30c426cd183bfdf86889faba8b4732d6
SHA512 ad89270a47e292c931f47da322c055e168b0c4e28de69a20cbf42db9e60fbd59ceb02c01d1c18b1c931d0f23d19230b1c6390d98f36048a3c581b78ffe75ce40

C:\Users\Admin\AppData\Local\Temp\mi.exe

MD5 aba23d7f60f40f4dee64fa440d5db6e6
SHA1 dde62462dc7887a6b3ba193eafb50da17ef40e67
SHA256 6398817cc923cfad6178c53c6ba9da1f30c426cd183bfdf86889faba8b4732d6
SHA512 ad89270a47e292c931f47da322c055e168b0c4e28de69a20cbf42db9e60fbd59ceb02c01d1c18b1c931d0f23d19230b1c6390d98f36048a3c581b78ffe75ce40

memory/2404-140-0x000000000C6B0000-0x000000000C93B000-memory.dmp

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

C:\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

\Windows\Temp\setup.exe

MD5 bc202c47461acbe8bef80e143eb3a364
SHA1 0ef433c2e54c4097f0ac3dc722fb9e4e7b7c2634
SHA256 df144eec828ac28a99d5d148493b3a4c8f36fce79ea7c41c08511ff69d6762bb
SHA512 3bec158714630e6d38867ddba74eda37e036fa2d31c3b3b83229ab593ee85e36c9964aebb31a847bb5b0e65932d8fcfe0860cb6b2a7a31c10204887daa018e08

C:\Windows\Temp\setup.exe

MD5 bc202c47461acbe8bef80e143eb3a364
SHA1 0ef433c2e54c4097f0ac3dc722fb9e4e7b7c2634
SHA256 df144eec828ac28a99d5d148493b3a4c8f36fce79ea7c41c08511ff69d6762bb
SHA512 3bec158714630e6d38867ddba74eda37e036fa2d31c3b3b83229ab593ee85e36c9964aebb31a847bb5b0e65932d8fcfe0860cb6b2a7a31c10204887daa018e08

C:\Windows\Temp\setup.exe

MD5 bc202c47461acbe8bef80e143eb3a364
SHA1 0ef433c2e54c4097f0ac3dc722fb9e4e7b7c2634
SHA256 df144eec828ac28a99d5d148493b3a4c8f36fce79ea7c41c08511ff69d6762bb
SHA512 3bec158714630e6d38867ddba74eda37e036fa2d31c3b3b83229ab593ee85e36c9964aebb31a847bb5b0e65932d8fcfe0860cb6b2a7a31c10204887daa018e08

memory/372-153-0x00000000036C0000-0x0000000004925000-memory.dmp

memory/468-155-0x000000013F150000-0x00000001403B5000-memory.dmp

memory/2548-156-0x0000000000CF0000-0x0000000000F7B000-memory.dmp

memory/468-154-0x000000013F150000-0x00000001403B5000-memory.dmp

memory/468-157-0x0000000076EF0000-0x0000000077099000-memory.dmp

memory/468-158-0x000000013F150000-0x00000001403B5000-memory.dmp

\Users\Admin\AppData\Local\Temp\cc.exe

MD5 858f82fe9166c34b6709a3adfe6a625f
SHA1 63275e4b77e0fe6fa6f1db716b5963b69b68f8a5
SHA256 8ec2c1bb10e05a5129269488b53a46c6b5be3691c61ef7da7c6eecf1c0444b28
SHA512 1338082ebb6bf658125cd6d72f5885c78865c1abbed50fd10317dacaf41a450eb98b949631f1a1b94a67d335b23cfc0fa78d0d8db3d726adf2a57af50307b89e

memory/2404-164-0x000000000C760000-0x000000000CD94000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cc.exe

MD5 858f82fe9166c34b6709a3adfe6a625f
SHA1 63275e4b77e0fe6fa6f1db716b5963b69b68f8a5
SHA256 8ec2c1bb10e05a5129269488b53a46c6b5be3691c61ef7da7c6eecf1c0444b28
SHA512 1338082ebb6bf658125cd6d72f5885c78865c1abbed50fd10317dacaf41a450eb98b949631f1a1b94a67d335b23cfc0fa78d0d8db3d726adf2a57af50307b89e

memory/1304-165-0x00000000770E0000-0x00000000770E2000-memory.dmp

memory/1304-166-0x0000000001230000-0x0000000001864000-memory.dmp

memory/468-159-0x000000013F150000-0x00000001403B5000-memory.dmp

memory/468-167-0x000000013F150000-0x00000001403B5000-memory.dmp

memory/1304-169-0x0000000001230000-0x0000000001864000-memory.dmp

memory/2404-168-0x0000000073F10000-0x00000000745FE000-memory.dmp

memory/468-172-0x000000013F150000-0x00000001403B5000-memory.dmp

memory/468-170-0x000000013F150000-0x00000001403B5000-memory.dmp

memory/1304-171-0x00000000003A0000-0x0000000000410000-memory.dmp

memory/1304-175-0x0000000003140000-0x00000000031AC000-memory.dmp

memory/1304-174-0x00000000031C0000-0x0000000003200000-memory.dmp

memory/1304-173-0x0000000073F10000-0x00000000745FE000-memory.dmp

memory/1304-176-0x00000000031C0000-0x0000000003200000-memory.dmp

memory/1304-177-0x00000000031C0000-0x0000000003200000-memory.dmp

memory/1304-181-0x00000000031C0000-0x0000000003200000-memory.dmp

memory/468-180-0x000000013F150000-0x00000001403B5000-memory.dmp

memory/372-179-0x00000000036C0000-0x0000000004925000-memory.dmp

memory/1304-178-0x0000000005D50000-0x0000000005E02000-memory.dmp

memory/1644-189-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/1644-183-0x0000000000400000-0x0000000000527000-memory.dmp

memory/1644-182-0x0000000000400000-0x0000000000527000-memory.dmp

memory/1644-222-0x0000000000400000-0x0000000000527000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\CrashpadMetrics-active.pma

MD5 03c4f648043a88675a920425d824e1b3
SHA1 b98ce64ab5f7a187d19deb8f24ca4ab5d9720a6d
SHA256 f91dbb7c64b4582f529c968c480d2dce1c8727390482f31e4355a27bb3d9b450
SHA512 2473f21cf8747ec981db18fb42726c767bbcca8dd89fd05ffd2d844206a6e86da672967462ac714e6fb43cc84ac35fffcec7ddc43a9357c1f8ed9d14105e9192

memory/468-226-0x0000000076EF0000-0x0000000077099000-memory.dmp

memory/468-227-0x000000013F150000-0x00000001403B5000-memory.dmp

memory/1644-228-0x0000000000400000-0x0000000000527000-memory.dmp

memory/1644-229-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-255-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-254-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-253-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-252-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-251-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-250-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-249-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-248-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-247-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-246-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-245-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-244-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-243-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-242-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-241-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-256-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-240-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-239-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-238-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-237-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-236-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-235-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-234-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-233-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-232-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-231-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-230-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-272-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-271-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-270-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-269-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-268-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-267-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-266-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-265-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-264-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-263-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1304-262-0x0000000001230000-0x0000000001864000-memory.dmp

memory/1644-261-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-260-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-259-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-258-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

memory/1644-257-0x00000000FFFA0000-0x00000000FFFB0000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Local State

MD5 23c95c7604300a3b2b43657caf12ede7
SHA1 5320d0bb0c83292cee73c568de316457b0f6e5c7
SHA256 cdfb65b68d11512436c1b48fcd9a5e7f15452450455b5cb36260b6742fc476ab
SHA512 eca4f437a7ae783fcf7b622406ebb34bca8779199712efcdd78c70df0c14e279dcbbfa25cc9aefac2c4e225801b3e0bdaf5ebe3a531c30efc20934b4811ff313

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

memory/1644-300-0x00000000770EF000-0x00000000770F0000-memory.dmp

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

\??\pipe\crashpad_2108_CNFMAKLJSDUVEKXY

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/1304-306-0x0000000073F10000-0x00000000745FE000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Local Storage\leveldb\LOG

MD5 0161f95d6e58d0fef1cb42c7d571c3b5
SHA1 db9f7e2f83d1242e33674c4d7acea166253cf32d
SHA256 97b1836b48c087ca0a4f5e552f2570cf3803c97996fe76039c9bc5f8f196d81a
SHA512 b4ca28f90bdc7ea9b43c5a103e21824256a7266c42ca50017a2e52bab1690b5a75f626a6a03c8cdcbfcee30c5069a94dbbfda4c7bafaeae6f9d13a7d9e24b4b7

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Local Storage\leveldb\LOG.old

MD5 f6bfa7b546513ea42975fa47714913d4
SHA1 f89fd1d28f5c2ddc67ccf3723ee0101b4fceb6ea
SHA256 73fc943c4b40df27f343ddb47e94dbe7cc282f549cabbe118edd1c1becf616b3
SHA512 45a43dcc4b0b5c5c02cc872862d02545ede7400033728f2afa7e6728e7a6fe310dcd95d84dff9ab4c47b9df9b261fee96447d48183edef44a69739659cc5f91c

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Local Storage\leveldb\MANIFEST-000004

MD5 031d6d1e28fe41a9bdcbd8a21da92df1
SHA1 38cee81cb035a60a23d6e045e5d72116f2a58683
SHA256 b51bc53f3c43a5b800a723623c4e56a836367d6e2787c57d71184df5d24151da
SHA512 e994cd3a8ee3e3cf6304c33df5b7d6cc8207e0c08d568925afa9d46d42f6f1a5bdd7261f0fd1fcdf4df1a173ef4e159ee1de8125e54efee488a1220ce85af904

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Local Storage\leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

memory/1304-331-0x00000000031C0000-0x0000000003200000-memory.dmp

\Users\Admin\AppData\Local\Temp\cli.exe

MD5 b78141a544759e1a07740aa28b35584c
SHA1 af95ccd7d12c7ed7bdc6782373302118d2ebe3a8
SHA256 e268b72e92c9d9af52c25f4d7643bd96c84172fadb4e7a300091eb287ee3a35d
SHA512 2f83ef2eaf8951d392f32405dd9c2555be803f63cbdb9118c4204ad148a254a19aa593082a2f5c7a1b962329df08fede026d0715513adf26d838f043fd451959

memory/1304-334-0x00000000031C0000-0x0000000003200000-memory.dmp

memory/1304-339-0x00000000031C0000-0x0000000003200000-memory.dmp

memory/2568-341-0x000000001B320000-0x000000001B602000-memory.dmp

memory/2568-342-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

memory/1304-343-0x0000000002D90000-0x0000000002DD2000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Network\Cookies

MD5 c9ff7748d8fcef4cf84a5501e996a641
SHA1 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA256 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512 d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

memory/2568-350-0x000007FEF35F0000-0x000007FEF3F8D000-memory.dmp

memory/2568-352-0x0000000002740000-0x00000000027C0000-memory.dmp

memory/2568-354-0x000007FEF35F0000-0x000007FEF3F8D000-memory.dmp

memory/2568-353-0x0000000002740000-0x00000000027C0000-memory.dmp

memory/2568-356-0x0000000002744000-0x0000000002747000-memory.dmp

memory/1304-355-0x00000000031C0000-0x0000000003200000-memory.dmp

C:\Windows\system32\drivers\etc\hosts

MD5 2b19df2da3af86adf584efbddd0d31c0
SHA1 f1738910789e169213611c033d83bc9577373686
SHA256 58868a299c5cf1167ed3fbc570a449ecd696406410b24913ddbd0f06a32595bd
SHA512 4a1831f42a486a0ad2deef3d348e7220209214699504e29fdfeb2a6f7f25ad1d353158cd05778f76ef755e77ccd94ce9b4a7504039e439e4e90fa7cde589daa6

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 85fc2a0a24c1f32a3cc2406a0c47b0b1
SHA1 0bc355bb65e676fea8a4e367ddac56b099119028
SHA256 2ceb707d347197c109225a6699bebf199e909574fa0f9cf91740739959346ccc
SHA512 585d18de3fec25016fc5a4c64b0fbc91955250632a3014cbbb51abf0dc222ca404526b090a89bfc2933c6f697354d54e108996a2e510fd1ae68a6266063a0fe4

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Session Storage\CURRENT~RFf77b867.TMP

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

memory/1284-369-0x000000001B2A0000-0x000000001B582000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\BF4OSVR2QAHRTKW3ZM8X.temp

MD5 85fc2a0a24c1f32a3cc2406a0c47b0b1
SHA1 0bc355bb65e676fea8a4e367ddac56b099119028
SHA256 2ceb707d347197c109225a6699bebf199e909574fa0f9cf91740739959346ccc
SHA512 585d18de3fec25016fc5a4c64b0fbc91955250632a3014cbbb51abf0dc222ca404526b090a89bfc2933c6f697354d54e108996a2e510fd1ae68a6266063a0fe4

memory/1284-378-0x0000000002360000-0x0000000002368000-memory.dmp

memory/1284-379-0x000007FEF3580000-0x000007FEF3F1D000-memory.dmp

memory/1284-380-0x00000000024C0000-0x0000000002540000-memory.dmp

memory/1284-385-0x00000000024C0000-0x0000000002540000-memory.dmp

memory/1284-384-0x00000000024C0000-0x0000000002540000-memory.dmp

memory/1284-383-0x000007FEF3580000-0x000007FEF3F1D000-memory.dmp

memory/1284-420-0x00000000024C0000-0x0000000002540000-memory.dmp

memory/1284-444-0x000007FEF3580000-0x000007FEF3F1D000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000002.dbtmp

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Windows\Temp\setup.exe

MD5 bc202c47461acbe8bef80e143eb3a364
SHA1 0ef433c2e54c4097f0ac3dc722fb9e4e7b7c2634
SHA256 df144eec828ac28a99d5d148493b3a4c8f36fce79ea7c41c08511ff69d6762bb
SHA512 3bec158714630e6d38867ddba74eda37e036fa2d31c3b3b83229ab593ee85e36c9964aebb31a847bb5b0e65932d8fcfe0860cb6b2a7a31c10204887daa018e08

memory/468-478-0x0000000076EF0000-0x0000000077099000-memory.dmp

memory/468-479-0x000000013F150000-0x00000001403B5000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 3f9b205b4ffd58520b652e85d316c0c8
SHA1 7817f57ff7a654004f5460eb0694596941b8ea26
SHA256 b5db1d9be891c8681b8d781713a5866a61aeb59d54fc43d36d59e425b43517ad
SHA512 ba67b180c0848f17b2e35f4fe074f45e0144daec15ea3f135fe7d575a6389e588b942f983e28fa3afdc626f9d891ea51cc50349a29229251dd8ef4cbe417d02f

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Service Worker\ScriptCache\index

MD5 54cb446f628b2ea4a5bce5769910512e
SHA1 c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256 fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA512 8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 2b97205cb739ef93668539e2061ad5b0
SHA1 d54db6fc79de1b57334ef352dbf21a2f68db2b51
SHA256 8959b8a7f3ec52601d460cb2025dc1c88d676503cfcfb4aef0b9ca5f88578b96
SHA512 9cc993c9d074e9c3c971f705697cdf1d270d72ed7206d18205ed0ba64922af151869c366aa1f9c14e7875d4e7972a67eb65e0af1e2c705b3f1d81cc96fc76d69

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\DawnCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\DawnCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\GPUCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\GPUCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

\Program Files\Google\Chrome\updater.exe

MD5 bc202c47461acbe8bef80e143eb3a364
SHA1 0ef433c2e54c4097f0ac3dc722fb9e4e7b7c2634
SHA256 df144eec828ac28a99d5d148493b3a4c8f36fce79ea7c41c08511ff69d6762bb
SHA512 3bec158714630e6d38867ddba74eda37e036fa2d31c3b3b83229ab593ee85e36c9964aebb31a847bb5b0e65932d8fcfe0860cb6b2a7a31c10204887daa018e08

C:\Program Files\Google\Chrome\updater.exe

MD5 bc202c47461acbe8bef80e143eb3a364
SHA1 0ef433c2e54c4097f0ac3dc722fb9e4e7b7c2634
SHA256 df144eec828ac28a99d5d148493b3a4c8f36fce79ea7c41c08511ff69d6762bb
SHA512 3bec158714630e6d38867ddba74eda37e036fa2d31c3b3b83229ab593ee85e36c9964aebb31a847bb5b0e65932d8fcfe0860cb6b2a7a31c10204887daa018e08

memory/2584-621-0x000000013F790000-0x00000001409F5000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Code Cache\js\474aa3bf634a0814_0

MD5 91d852e4e4887f31eac6c1b7af2ad8a2
SHA1 70ddaf7a0b160d1fc665702f425a91b5984870ac
SHA256 d943888fb348c7a2b63774a9f046c4a235ddc76209764c4971dcbbe04db61c6a
SHA512 e950b70c87e4c8f071409a4b021c0bc7cf0cb9530a8c8fe545551900ae2736045b9c744a9d9a5cd37d100f42c013da137e05890dcb9e9aadd4ebeb2e01e85a30

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Code Cache\js\2e64514b9cd267ab_0

MD5 3a21157447060070b3204d71c50800a8
SHA1 3cfa13e2c2741d5937497b0195e6f24092513c96
SHA256 bd56858740b456d4578392834bd098182b9b4b661cf26776ab3d4f66cba46049
SHA512 e0be46c17a9e6cb1fc53bb2f5aa54279af938829047ee99a28410c199e202d62a198279799436b0db11f5a4768256ee9d6fa892acb0e367aed06ec1064072744

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Code Cache\js\2016c72aa5f54f52_0

MD5 8e360863369f34f7aa096ee702b8fd6e
SHA1 b0fe8d475ad2d8c880f795faa649909acedaae76
SHA256 50515b2f999131ef7e8599089637b55118f841bdbd6043c5e17304c001bf8e59
SHA512 41de2907d5fadcb7e81585a59232aefb90e625aa1a3accac05ef78fa8cd10d941c6923cd9cf4bb99474028eb9d39eaf4e9d3d380d1d39fd87bfec758ebcdca57

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Code Cache\js\10e544c7a72e2f65_0

MD5 fb055bcfbaa047a202463c55aaf7adbe
SHA1 8d168568fee3fa13f54cc7000d433c36b5906f70
SHA256 565522a367d0e4fe4e89ff29253f33154871862dd411de5c3f03f2e6d45f6687
SHA512 4f4ee88667eb0314134ed12b446a30402ed1dcba073b22384cec2f28e0c16f8b27f8d6972ad7efa18e6853d5fb2b730ba1bb01ed8d238949ef922aeb68d370ff

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Code Cache\js\03c93927cb3db117_0

MD5 831376dc3be252e1be1ba0584e173705
SHA1 3b3e7692dda1386dacebbd651f09d258bda7bdde
SHA256 43d58b9bcc497ad8449f2b3b50d1257de79ca5040f315ca8a3e459ff449a96c5
SHA512 ecf54518c17f225912a69b9581dbe1cbfee8b76840458e0e03c11c3a0e42fee0a494cd3c143b831c58de260ce919097cf4708e9e40609f7adced133de4f73d61

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\index

MD5 f295b64018e980a59538413602c14f62
SHA1 91d66173d9bd533b687af770d8bd52e175344c50
SHA256 716d46d41dd7eaf0cc26f7feb393d2387c957e1aa07c44c5d7d05581dad52c6a
SHA512 75ffe35a01ee79675db833559e0024c47379d47b77c26b130fe5697a060d75933fbe9ec4002fc340fdd1e59b2aadd7e9eacc990364e9ce866ae377a8137cdc58

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000012

MD5 767ffe2da148ab1b56e1cf31badb0dbf
SHA1 167aad2ec09c24ed963dc9984a1a205e3e2e8afb
SHA256 81b047bf6c7780a0f934eaa977ad932d96c4e3672ae6280769695bdfc834094a
SHA512 baa0ed9eaee8057e9ecac62de3d6fef6c8d19f67581b43a174e08b174ff52182b29f96a51a0aa742f5a5ae9af878501b5d08a93f87c5362f3ce8e00594491f5d

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000011

MD5 3eff107111d8dfc91e048573b1f227d8
SHA1 dde20da014e819d11e138b346121cc97791e9dcd
SHA256 0e8fc4bbc6a3e0c34adf9ee888b297d516d0db0a9cdc5b3632a01484d418374d
SHA512 223386fb5bd3709b1929a52ead00e81494fe81f822301acbf3920a4292432ffce5dda21c503622f9f373807cd447b7209a8dfd193d4ce8cc44e0b100db8a74fd

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000010

MD5 789fd4f17cc11ac527dc82ac561b3220
SHA1 83ac8d0ad8661ab3e03844916a339833169fa777
SHA256 5459e6f01b7edde5f425c21808de129b69470ee3099284cb3f9413d835903739
SHA512 742d95bb65dcc72d7ce7056bd4d6f55e2811e98f7a3df6f1b7daef946043183714a8a3049b12a0be8ac21d0b4f6e38f7269960e57b006dfec306158d5a373e78

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_00000f

MD5 8f85a434b0b0f86f391c877919778260
SHA1 03ab0b1102a6fab1dcbc72bc0f4ecbe9cb83db72
SHA256 cfa7de2e1edcd4d3ccbd5f5aa1abe9ede00e6a1c0e2425694509a0cd6f7cdf6b
SHA512 ecd8dc0136b6f123dcb647423a234ba8b5a183882e1bb5f62bf6b223e5b8579d30130ff2b73bbcfadb1b6081ea479273b2386c1e741fb74b94e0bb38cf5c98d3

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_00000e

MD5 4e96db351538d4169bf9b8e46997036a
SHA1 564e83facf1f42b333d0a244e1d89eea5f2f8557
SHA256 ad14c57852be3c18422b078d69ec21d4112d19c6bf26e3c29184fb4c590ce7a8
SHA512 3566dc085f5c7ee75b5a0e7e6ecab4a9391b75c6220fee271faa1a0dcf48396ea685107d9e47370a9b78713f96a73d5002c797a337580df78a303a57a6159581

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_00000d

MD5 189badc72a668aade50699ae05067c2a
SHA1 5458410fc96bcf08b29f204b05470dad5882afb9
SHA256 896d76b06fe7bc62fa10e8f9091b84584d8fdbd7eaaea1183f7c1e5e3a98c559
SHA512 287ff71f9b6ab261f989792cfee0b99e1745c57e8e8c9c3c55e07592a835008673a9ee5b2099ef9beb6ef4343c10827109b281b2fbed0fe0de1da020723c622b

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_00000c

MD5 2d52125a96fb5a7227c67848bc18f65c
SHA1 a3593c6d8e3b6b458b6bbc2c6423dc76e30a84a3
SHA256 61f3154c19e46e1989d6fadbfe20835d0c9fc47242dc5828e776e3ec667fda24
SHA512 5f151708007cb474e64e8968b1f6b5e5331c434cc237627c6c5c92d1894d020f476ad88461e35fbf383aa46750a9cdcaf3a2ac8fe90570753c73fcf17ac0cbe6

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_00000b

MD5 7db3096a5ce269d5140afbedb84e0fb7
SHA1 1155014e26835855c4177e8916b0bbcd5e4cca61
SHA256 48662b9313a828746c1ba3edfa196d8ecd6b0ca730848ead5418fcde8da4a809
SHA512 a349f3265db5ebff9e535778ccc92bc846fa9a4175dbf4d9c0e5b77d294ae521eca5f104d45f0eab0bba88120a08103ce997a420ecace703e211796e842ca7dc

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_00000a

MD5 7d75a9eb3b38b5dd04b8a7ce4f1b87cc
SHA1 68f598c84936c9720c5ffd6685294f5c94000dff
SHA256 6c24799e77b963b00401713a1dbd9cba3a00249b9363e2c194d01b13b8cdb3d7
SHA512 cf0488c34a1af36b1bb854dea2decfc8394f47831b1670cab3eed8291b61188484cc8ab0a726a524ecdd20b71d291bcccbc2ce999fd91662aca63d2d22ed0d9f

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000009

MD5 6a3bb9c5ba28ee73af6c1b53e281b0cf
SHA1 d96e403c99c1707f82ea29c2c1f134e792c64097
SHA256 2f5adfc38558162578ffe112229f10417fbc4b3df025d153d4e22a0c95177740
SHA512 6c4844f70969938339cb6716a834a79e1a8379459c87b983c2518b9cbb560cb2f101aff980f682989928523be6cdc99bde3bfd8137f9c54a58191b900b580fbf

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000008

MD5 c101a8ba729b894927d7d884e4be68a8
SHA1 4bf48f94ff4e50e81c9d83b641af74b3bed580a0
SHA256 544f08482a62485be4acbc443462b01fe16b408b3d154c0cb1ff921a453cee33
SHA512 77483a92abeed799dfb1e782988569875b29eccebfb14e5be353302849ea6f0ac6a6411a72d6da706ec3767a54f12907fd0bfa4646ad4ca1cf4e1e15fbe9a9ed

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000007

MD5 9f1c899a371951195b4dedabf8fc4588
SHA1 7abeeee04287a2633f5d2fa32d09c4c12e76051b
SHA256 ba60b39bc10f6abd7f7a3a2a9bae5c83a0a6f7787e60115d0e8b4e17578c35f7
SHA512 86e75284beaff4727fae0a46bd8c3a8b4a7c95eceaf45845d5c3c2806139d739c983205b9163e515f6158aa7c3c901554109c92a7acc2c0077b1d22c003dba54

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000006

MD5 21808cd0724524589cd4ec1ce26f6d58
SHA1 fc5cc4cb347ed20389626c58a6de396ef1ac5ada
SHA256 1a7608a326717e18f424991b924d9c7319eb273cc3af432585d95ce8b068ca8d
SHA512 36902ff35a1ed469aa9cab3856b1b0057ca7db8ea4d92ca1d129e68f02eebd5322a4e81aec29a2b1c0c289e2f82df13684ccf0305378878494260c4d4e6caf0d

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000005

MD5 5641d2e6eb6f88f5c306ef14bcda7513
SHA1 1714fcfbf63fc8d860c0edb99ca221ac99194f07
SHA256 d573a0546fac381049946c0b0bdad4c42d2e60b572b79ed8c41e51894d9ef1ab
SHA512 2f4d2220ce860110fb6ad9b438b05d43551577f93f45bc97f56aa80c89e1a369734b64c190335a9df1963c547a5b607c5f8e3e229da906a36ff6f96d387a1774

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000004

MD5 b096dc9a3e4e6748a91abe826cf5d165
SHA1 b115fd9390e39b86a711039745cbad73741d7252
SHA256 7552567793d51609afaac7d5e1b3d2289f1a64a323a84c74c28fe615075e1c3f
SHA512 c075f36473b578f645ab66f1800d6e0a61b66719361c8c730ccb4505c1ab127ce96d5409c0c82aeddbc2bd03bef6c7a905310e4462ac7a0ebb2e07b45cf33a94

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000003

MD5 01af703c52ac5a93685bb3911d6918f1
SHA1 cbb1279745c1c2208fb9b8606e3d3513cd5dc3e7
SHA256 75ecbede729daef7531a6e43dcaf82afd1ac691c5a993231ddbe40254bf01653
SHA512 fbf1f2a3180f001cab1a860425f750010d6932479b343d5848ee0a78e03e29a46a123ee0103560d87df32daa3f6878cde07927e11e0615ad8e3c8e1568b942c6

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000002

MD5 01af703c52ac5a93685bb3911d6918f1
SHA1 cbb1279745c1c2208fb9b8606e3d3513cd5dc3e7
SHA256 75ecbede729daef7531a6e43dcaf82afd1ac691c5a993231ddbe40254bf01653
SHA512 fbf1f2a3180f001cab1a860425f750010d6932479b343d5848ee0a78e03e29a46a123ee0103560d87df32daa3f6878cde07927e11e0615ad8e3c8e1568b942c6

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\f_000001

MD5 f0e433ddd5d1699304fd54478c7668a2
SHA1 82e8f83666e3f9e5ab5edac810e2e2d647bdf7de
SHA256 d5613f024cc7cfd946fcddc51d2aea8c586f309360aada901cdbe7c19fd581b0
SHA512 30190313e66a4dad8ff82503db555c7017f9e1226c16883e21517c0e2a65442475a48023a51b46a05c1c5e818a300f6de1938a1a1f0b6688f63a11d6d2a62be0

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\data_3

MD5 a74fab01be010de2648cffcd1eba5467
SHA1 49ca8895f4c251e5cfdd79be85dd985c063a76b8
SHA256 053bd6f20bdce8a8dd786e298323646de48aafd09f5db9d62f484c710f7bda74
SHA512 40732728ce39a61a57b6f05103c0003fd4e86cd251b9d4a9900ac2ca06b36a4a51cbc77365a2ec37367b38ee484451151f5afb54256bdb60051106ebb666234d

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\data_2

MD5 ce8cb54b06d326be7a5820cf77f7c953
SHA1 0f2f1983e8426d445d4c8fbac6e768ca8fd87db3
SHA256 5a2ae8cfda573c75e0ab10bb741503b09915262d74d96be1df1d6c31fef9b731
SHA512 11e448ad2aa94308b50ff316ae229591ea9602715e9818a3cafa21965090fe5e5a20b28c89a11c5e8d2eaed98c9e30d546aa0651b705d887c41f9294a8b2ff78

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\data_1

MD5 52cdf3122fe5b123fc3775f422d1bb16
SHA1 ae3f6bdac95c9df7137711d4c4fb3a2fdb639d0a
SHA256 0c029c0924913e2233da055759763f4c8c479b153f0052776652293228734705
SHA512 55e35766a61c6fb786a3d86952e788c1ddf80fe460dd9af40d8ae6ddf3ead9eb6ad0af69fdf20b3c866489e6606b037c44f01bdf93e65acc355d7d681dae6fba

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\Cache\Cache_Data\data_0

MD5 6d0882896991d13dca7f648c596fa0b4
SHA1 91027731c2d7054258b15cdd87739b298819be03
SHA256 0347cbc8f47eb468b76b7ca9e44358586b197eab8c1d73883cc1d779105008f2
SHA512 937e9d970c1a4ff22d8f5fc22d273829854ee8a3813c1184e40789c21200cd5b42ba3fe559bf6da0c27768359967b3e4e8bbef68249fb352d513d35085f9920b

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Default\chrome_debug.log

MD5 5f92edacd503cfae7f64b2cfa5685ae0
SHA1 d17335937fca6adcec88b66d062af292bcb17054
SHA256 34994b698e798bc81fd15adc7b0064cf185d40ddf95f6b2c1ae2dacbe7a29d8e
SHA512 8f9fac5a3001feb49e69f22586d2d07d7d445cfa96f666a7bc1761264e53fd2388cbc4bf588b5e3d35311d55d1115248b9578e4134ee4211029606a596e19d31

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\Crashpad\settings.dat

MD5 1b5667f67985dd7e85900d89e1936117
SHA1 1c1ccc13fd30d0ab0637874a2f8036c5ca8adfb7
SHA256 0d5d48fff0572441defcd7017db05054912a0f02fde0e0c4f47f367900f9293c
SHA512 8962e591420522c74652cff0eb4810d696aae73d068c3d354bf54e5e9333fca2b7bac213ac48cced30b2fef1a9d8327ac014bb7732a51707766a38862f934c9d

C:\Users\Admin\AppData\Local\Google\Chrome\User DataT4LDD\DevToolsActivePort

MD5 e46f092e1b6eee3776f8452d85a17376
SHA1 71041bb94e4c5114fbcbf9c624cd152cc7b35669
SHA256 68e2015727c604232d4009123822573c41434a3f3f6b3eb8e3df7ef7a075f258
SHA512 74c693629f4f5704454c4821f26aef741f0dea62190999da8d995e63654ac7d3a7e0ef3b90d1ce05d582398a19eb09514068c2666d03f952c7bd2172eb0331a9

memory/2568-683-0x000000013F790000-0x00000001409F5000-memory.dmp

memory/2568-685-0x0000000076EF0000-0x0000000077099000-memory.dmp

memory/1304-686-0x0000000001230000-0x0000000001864000-memory.dmp

memory/1304-687-0x0000000073F10000-0x00000000745FE000-memory.dmp

memory/2584-689-0x000000013F790000-0x00000001409F5000-memory.dmp

memory/2568-690-0x000000013F790000-0x00000001409F5000-memory.dmp

memory/2440-692-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

memory/2440-691-0x0000000019D10000-0x0000000019FF2000-memory.dmp

memory/2440-693-0x0000000000FD0000-0x0000000001050000-memory.dmp

memory/2440-695-0x0000000000240000-0x0000000000248000-memory.dmp

memory/2440-694-0x0000000000FD0000-0x0000000001050000-memory.dmp

memory/2440-696-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

memory/2440-697-0x0000000000FD0000-0x0000000001050000-memory.dmp

memory/2440-698-0x0000000000FD0000-0x0000000001050000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-12 13:18

Reported

2023-08-12 13:21

Platform

win10v2004-20230703-en

Max time kernel

142s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe"

Signatures

RedLine

infostealer redline

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\1732-62-0x0000000003520000-0x0000000003554000-memory.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
PL 51.83.170.21:19447 tcp
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 21.170.83.51.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 0.77.109.52.in-addr.arpa udp
US 8.8.8.8:53 104.193.132.51.in-addr.arpa udp

Files

memory/2156-133-0x0000000074E10000-0x00000000755C0000-memory.dmp

memory/2156-134-0x0000000000BE0000-0x0000000000C14000-memory.dmp

memory/2156-135-0x0000000005CB0000-0x00000000062C8000-memory.dmp

memory/2156-136-0x00000000057A0000-0x00000000058AA000-memory.dmp

memory/2156-138-0x0000000005580000-0x0000000005590000-memory.dmp

memory/2156-137-0x00000000056B0000-0x00000000056C2000-memory.dmp

memory/2156-139-0x0000000005710000-0x000000000574C000-memory.dmp

memory/2156-140-0x0000000005A20000-0x0000000005A96000-memory.dmp

memory/2156-141-0x0000000005B40000-0x0000000005BD2000-memory.dmp

memory/2156-142-0x0000000074E10000-0x00000000755C0000-memory.dmp

memory/2156-143-0x0000000006D70000-0x0000000007314000-memory.dmp

memory/2156-144-0x0000000005BE0000-0x0000000005C46000-memory.dmp

memory/2156-145-0x0000000006620000-0x0000000006670000-memory.dmp

memory/2156-146-0x0000000005580000-0x0000000005590000-memory.dmp

memory/2156-147-0x0000000007320000-0x00000000074E2000-memory.dmp

memory/2156-148-0x0000000008F40000-0x000000000946C000-memory.dmp

memory/2156-150-0x0000000074E10000-0x00000000755C0000-memory.dmp