Malware Analysis Report

2025-04-14 07:31

Sample ID 230913-pct5ssbf6y
Target d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba
SHA256 d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba
Tags
amadey djvu fabookie redline smokeloader vidar 7b01483643983171e949f923c5bc80e7 logsdiller cloud (tg: @logsdillabot) lux3 pub1 smokiez_build backdoor discovery infostealer persistence ransomware spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba

Threat Level: Known bad

The file d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba was found to be: Known bad.

Malicious Activity Summary

amadey djvu fabookie redline smokeloader vidar 7b01483643983171e949f923c5bc80e7 logsdiller cloud (tg: @logsdillabot) lux3 pub1 smokiez_build backdoor discovery infostealer persistence ransomware spyware stealer trojan

Amadey

Vidar

Detected Djvu ransomware

RedLine

Djvu Ransomware

Detect Fabookie payload

Fabookie

SmokeLoader

Downloads MZ/PE file

Modifies file permissions

Loads dropped DLL

Executes dropped EXE

Reads user/profile data of web browsers

Deletes itself

Adds Run key to start application

Accesses 2FA software files, possible credential harvesting

Looks up external IP address via web service

Checks installed software on the system

Accesses cryptocurrency files/wallets, possible credential harvesting

Suspicious use of SetThreadContext

Enumerates physical storage devices

Program crash

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

Suspicious behavior: MapViewOfSection

Suspicious behavior: LoadsDriver

Checks SCSI registry key(s)

Suspicious use of AdjustPrivilegeToken

Checks processor information in registry

Suspicious behavior: GetForegroundWindowSpam

Delays execution with timeout.exe

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-09-13 12:11

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-13 12:11

Reported

2023-09-13 12:14

Platform

win10-20230831-en

Max time kernel

76s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba.exe"

Signatures

Amadey

trojan amadey

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Fabookie

spyware stealer fabookie

RedLine

infostealer redline

SmokeLoader

trojan backdoor smokeloader

Vidar

stealer vidar

Downloads MZ/PE file

Deletes itself

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\601D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\632C.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6494.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\662B.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\6C37.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8473.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8678.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8473.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\88DA.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\958D.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A5BC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A5BC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8473.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8473.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A5BC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A5BC.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe N/A
N/A N/A C:\Windows\System32\Conhost.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses 2FA software files, possible credential harvesting

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\a5839173-1a13-4fe7-86ef-418671591ae8\\5E67.exe\" --AutoStart" C:\Users\Admin\AppData\Local\Temp\5E67.exe N/A

Checks installed software on the system

discovery

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4880 set thread context of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 1268 set thread context of 4648 N/A C:\Users\Admin\AppData\Local\Temp\632C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4916 set thread context of 3936 N/A C:\Users\Admin\AppData\Local\Temp\6494.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1836 set thread context of 2400 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 2188 set thread context of 3960 N/A C:\Users\Admin\AppData\Local\Temp\8473.exe C:\Users\Admin\AppData\Local\Temp\8473.exe
PID 4060 set thread context of 3084 N/A C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe
PID 4152 set thread context of 3852 N/A C:\Users\Admin\AppData\Local\Temp\8678.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4504 set thread context of 4804 N/A C:\Users\Admin\AppData\Local\Temp\A5BC.exe C:\Users\Admin\AppData\Local\Temp\A5BC.exe
PID 2060 set thread context of 4168 N/A C:\Users\Admin\AppData\Local\Temp\8473.exe C:\Users\Admin\AppData\Local\Temp\8473.exe
PID 4260 set thread context of 4156 N/A C:\Users\Admin\AppData\Local\Temp\A5BC.exe C:\Users\Admin\AppData\Local\Temp\A5BC.exe
PID 1368 set thread context of 1480 N/A C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe
PID 1760 set thread context of 4736 N/A C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\cc.exe

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\958D.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\958D.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\958D.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\601D.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\662B.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3124 wrote to memory of 4880 N/A N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 3124 wrote to memory of 4880 N/A N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 3124 wrote to memory of 4880 N/A N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 3124 wrote to memory of 4236 N/A N/A C:\Users\Admin\AppData\Local\Temp\601D.exe
PID 3124 wrote to memory of 4236 N/A N/A C:\Users\Admin\AppData\Local\Temp\601D.exe
PID 3124 wrote to memory of 4236 N/A N/A C:\Users\Admin\AppData\Local\Temp\601D.exe
PID 4880 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 4880 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 4880 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 4880 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 4880 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 4880 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 4880 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 4880 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 4880 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 4880 wrote to memory of 3592 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Users\Admin\AppData\Local\Temp\5E67.exe
PID 3124 wrote to memory of 1268 N/A N/A C:\Users\Admin\AppData\Local\Temp\632C.exe
PID 3124 wrote to memory of 1268 N/A N/A C:\Users\Admin\AppData\Local\Temp\632C.exe
PID 3124 wrote to memory of 1268 N/A N/A C:\Users\Admin\AppData\Local\Temp\632C.exe
PID 3124 wrote to memory of 4916 N/A N/A C:\Users\Admin\AppData\Local\Temp\6494.exe
PID 3124 wrote to memory of 4916 N/A N/A C:\Users\Admin\AppData\Local\Temp\6494.exe
PID 3124 wrote to memory of 4916 N/A N/A C:\Users\Admin\AppData\Local\Temp\6494.exe
PID 3592 wrote to memory of 4932 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Windows\SysWOW64\icacls.exe
PID 3592 wrote to memory of 4932 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Windows\SysWOW64\icacls.exe
PID 3592 wrote to memory of 4932 N/A C:\Users\Admin\AppData\Local\Temp\5E67.exe C:\Windows\SysWOW64\icacls.exe
PID 3124 wrote to memory of 496 N/A N/A C:\Users\Admin\AppData\Local\Temp\662B.exe
PID 3124 wrote to memory of 496 N/A N/A C:\Users\Admin\AppData\Local\Temp\662B.exe
PID 3124 wrote to memory of 496 N/A N/A C:\Users\Admin\AppData\Local\Temp\662B.exe
PID 3124 wrote to memory of 4672 N/A N/A C:\Users\Admin\AppData\Local\Temp\6C37.exe
PID 3124 wrote to memory of 4672 N/A N/A C:\Users\Admin\AppData\Local\Temp\6C37.exe
PID 3124 wrote to memory of 4672 N/A N/A C:\Users\Admin\AppData\Local\Temp\6C37.exe
PID 4672 wrote to memory of 3752 N/A C:\Users\Admin\AppData\Local\Temp\6C37.exe C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
PID 4672 wrote to memory of 3752 N/A C:\Users\Admin\AppData\Local\Temp\6C37.exe C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
PID 4672 wrote to memory of 3752 N/A C:\Users\Admin\AppData\Local\Temp\6C37.exe C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
PID 1268 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\632C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1268 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\632C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1268 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\632C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1268 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\632C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1268 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\632C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1268 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\632C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1268 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\632C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1268 wrote to memory of 4648 N/A C:\Users\Admin\AppData\Local\Temp\632C.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3752 wrote to memory of 3500 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\schtasks.exe
PID 3752 wrote to memory of 3500 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\schtasks.exe
PID 3752 wrote to memory of 3500 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\schtasks.exe
PID 3752 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\cmd.exe
PID 3752 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\cmd.exe
PID 3752 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe C:\Windows\SysWOW64\cmd.exe
PID 4916 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Local\Temp\6494.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4916 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Local\Temp\6494.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4916 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Local\Temp\6494.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4916 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Local\Temp\6494.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4916 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Local\Temp\6494.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4916 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Local\Temp\6494.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4916 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Local\Temp\6494.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 4916 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Local\Temp\6494.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2708 wrote to memory of 1264 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 1264 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 1264 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 4504 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\A5BC.exe
PID 2708 wrote to memory of 4504 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\A5BC.exe
PID 2708 wrote to memory of 4504 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\A5BC.exe
PID 2708 wrote to memory of 4268 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe
PID 2708 wrote to memory of 4268 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cacls.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba.exe

"C:\Users\Admin\AppData\Local\Temp\d0c79b65b24aee63f609e2ffa071434adf5906478a76f8b1d15b3c08fc64d1ba.exe"

C:\Users\Admin\AppData\Local\Temp\5E67.exe

C:\Users\Admin\AppData\Local\Temp\5E67.exe

C:\Users\Admin\AppData\Local\Temp\601D.exe

C:\Users\Admin\AppData\Local\Temp\601D.exe

C:\Users\Admin\AppData\Local\Temp\5E67.exe

C:\Users\Admin\AppData\Local\Temp\5E67.exe

C:\Users\Admin\AppData\Local\Temp\632C.exe

C:\Users\Admin\AppData\Local\Temp\632C.exe

C:\Users\Admin\AppData\Local\Temp\6494.exe

C:\Users\Admin\AppData\Local\Temp\6494.exe

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\a5839173-1a13-4fe7-86ef-418671591ae8" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\AppData\Local\Temp\662B.exe

C:\Users\Admin\AppData\Local\Temp\662B.exe

C:\Users\Admin\AppData\Local\Temp\6C37.exe

C:\Users\Admin\AppData\Local\Temp\6C37.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

"C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "yiueea.exe" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "yiueea.exe" /P "Admin:R" /E

C:\Windows\SysWOW64\cacls.exe

CACLS "..\577f58beff" /P "Admin:N"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Users\Admin\AppData\Local\Temp\5E67.exe

"C:\Users\Admin\AppData\Local\Temp\5E67.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\cacls.exe

CACLS "..\577f58beff" /P "Admin:R" /E

C:\Users\Admin\AppData\Local\Temp\5E67.exe

"C:\Users\Admin\AppData\Local\Temp\5E67.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe"

C:\Users\Admin\AppData\Local\Temp\8473.exe

C:\Users\Admin\AppData\Local\Temp\8473.exe

C:\Users\Admin\AppData\Local\Temp\8678.exe

C:\Users\Admin\AppData\Local\Temp\8678.exe

C:\Users\Admin\AppData\Local\Temp\8473.exe

C:\Users\Admin\AppData\Local\Temp\8473.exe

C:\Users\Admin\AppData\Local\Temp\88DA.exe

C:\Users\Admin\AppData\Local\Temp\88DA.exe

C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe

"C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe"

C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe

"C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build3.exe

"C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build3.exe"

C:\Users\Admin\AppData\Local\Temp\958D.exe

C:\Users\Admin\AppData\Local\Temp\958D.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\system32\regsvr32.exe

regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9DEB.dll

C:\Windows\SysWOW64\regsvr32.exe

/s C:\Users\Admin\AppData\Local\Temp\9DEB.dll

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

C:\Users\Admin\AppData\Local\Temp\8473.exe

"C:\Users\Admin\AppData\Local\Temp\8473.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\8473.exe

"C:\Users\Admin\AppData\Local\Temp\8473.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

"C:\Users\Admin\AppData\Local\Temp\A5BC.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

"C:\Users\Admin\AppData\Local\Temp\A5BC.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe

"C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe"

C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build3.exe

"C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build3.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe

"C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe" & exit

C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe

"C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe"

C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build3.exe

"C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build3.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe

"C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe"

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe" & exit

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe" & exit

C:\Windows\SysWOW64\timeout.exe

timeout /t 6

C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\cc.exe

"C:\Users\Admin\AppData\Local\Temp\cc.exe"

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 488

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=62880 --headless --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I" --profile-directory="Default"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd4,0xd8,0xdc,0xb0,0xe0,0x7ffc11b09758,0x7ffc11b09768,0x7ffc11b09778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --use-angle=swiftshader-webgl --headless --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --mojo-platform-channel-handle=1228 --field-trial-handle=1372,i,8593367817137312185,9569879501717536756,131072 --disable-features=PaintHolding /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1544 --field-trial-handle=1372,i,8593367817137312185,9569879501717536756,131072 --disable-features=PaintHolding /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --first-renderer-process --remote-debugging-port=62880 --allow-pre-commit-input --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1884 --field-trial-handle=1372,i,8593367817137312185,9569879501717536756,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=62880 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2292 --field-trial-handle=1372,i,8593367817137312185,9569879501717536756,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=62880 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2416 --field-trial-handle=1372,i,8593367817137312185,9569879501717536756,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=62880 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3016 --field-trial-handle=1372,i,8593367817137312185,9569879501717536756,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=62880 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3188 --field-trial-handle=1372,i,8593367817137312185,9569879501717536756,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --headless --lang=en-US --remote-debugging-port=62880 --allow-pre-commit-input --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3360 --field-trial-handle=1372,i,8593367817137312185,9569879501717536756,131072 --disable-features=PaintHolding /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=2428 --field-trial-handle=1372,i,8593367817137312185,9569879501717536756,131072 --disable-features=PaintHolding /prefetch:8

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x398

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=3216 --field-trial-handle=1372,i,8593367817137312185,9569879501717536756,131072 --disable-features=PaintHolding /prefetch:8

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 potunulit.org udp
US 188.114.96.0:80 potunulit.org tcp
US 8.8.8.8:53 colisumy.com udp
KR 115.88.24.200:80 colisumy.com tcp
US 8.8.8.8:53 0.96.114.188.in-addr.arpa udp
US 8.8.8.8:53 200.24.88.115.in-addr.arpa udp
US 8.8.8.8:53 api.2ip.ua udp
NL 194.169.175.232:80 194.169.175.232 tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 232.175.169.194.in-addr.arpa udp
US 8.8.8.8:53 254.217.0.162.in-addr.arpa udp
US 8.8.8.8:53 101.15.18.104.in-addr.arpa udp
RU 79.137.192.18:80 79.137.192.18 tcp
US 8.8.8.8:53 18.192.137.79.in-addr.arpa udp
US 38.181.25.43:3325 tcp
KR 115.88.24.200:80 colisumy.com tcp
US 8.8.8.8:53 43.25.181.38.in-addr.arpa udp
MD 176.123.9.142:14845 tcp
US 8.8.8.8:53 142.9.123.176.in-addr.arpa udp
NL 194.169.175.232:45450 tcp
RU 79.137.192.18:80 79.137.192.18 tcp
GB 51.38.95.107:42494 tcp
US 8.8.8.8:53 107.95.38.51.in-addr.arpa udp
US 8.8.8.8:53 z.nnnaajjjgc.com udp
NL 162.0.217.254:443 api.2ip.ua tcp
KR 115.88.24.200:80 colisumy.com tcp
MU 156.236.72.121:443 z.nnnaajjjgc.com tcp
US 95.214.27.254:80 tcp
US 8.8.8.8:53 zexeq.com udp
MK 95.86.30.3:80 zexeq.com tcp
US 8.8.8.8:53 121.72.236.156.in-addr.arpa udp
US 8.8.8.8:53 3.30.86.95.in-addr.arpa udp
US 8.8.8.8:53 142.33.222.23.in-addr.arpa udp
US 8.8.8.8:53 147.121.18.2.in-addr.arpa udp
NL 194.169.175.232:80 194.169.175.232 tcp
BG 193.42.32.101:80 193.42.32.101 tcp
US 8.8.8.8:53 101.32.42.193.in-addr.arpa udp
MK 95.86.30.3:80 zexeq.com tcp
US 8.8.8.8:53 login-sofi.4dq.com udp
DE 45.79.249.147:443 login-sofi.4dq.com tcp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
US 8.8.8.8:53 147.249.79.45.in-addr.arpa udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
US 8.8.8.8:53 108.26.221.154.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
NL 194.169.175.232:45450 tcp
US 8.8.8.8:53 t.me udp
NL 149.154.167.99:443 t.me tcp
US 8.8.8.8:53 99.167.154.149.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 36.249.124.192.in-addr.arpa udp
NL 162.0.217.254:443 api.2ip.ua tcp
US 95.214.27.254:80 tcp
DE 5.75.212.216:27015 5.75.212.216 tcp
US 8.8.8.8:53 216.212.75.5.in-addr.arpa udp
KR 115.88.24.200:80 colisumy.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
MK 95.86.30.3:80 zexeq.com tcp
KR 115.88.24.200:80 colisumy.com tcp
US 8.8.8.8:53 gudintas.at udp
AR 190.139.250.133:80 gudintas.at tcp
US 8.8.8.8:53 133.250.139.190.in-addr.arpa udp
AR 190.139.250.133:80 gudintas.at tcp
MK 95.86.30.3:80 zexeq.com tcp
AR 190.139.250.133:80 gudintas.at tcp
NL 149.154.167.99:443 t.me tcp
AR 190.139.250.133:80 gudintas.at tcp
DE 5.75.212.216:27015 5.75.212.216 tcp
US 95.214.27.254:80 tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
NL 149.154.167.99:443 t.me tcp
DE 5.75.212.216:27015 5.75.212.216 tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
US 95.214.27.254:80 tcp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
US 8.8.8.8:53 transfer.sh udp
DE 144.76.136.153:443 transfer.sh tcp
US 8.8.8.8:53 153.136.76.144.in-addr.arpa udp
AR 190.139.250.133:80 gudintas.at tcp
AR 190.139.250.133:80 gudintas.at tcp
US 95.214.27.254:80 tcp
US 8.8.8.8:53 96.134.101.95.in-addr.arpa udp
US 8.8.8.8:53 host-file-host6.com udp
US 8.8.8.8:53 host-host-file8.com udp
NL 194.169.175.127:80 host-host-file8.com tcp
US 8.8.8.8:53 127.175.169.194.in-addr.arpa udp
US 8.8.8.8:53 youtube.com udp
NL 216.58.214.14:443 youtube.com tcp
US 8.8.8.8:53 ogs.google.com udp
US 8.8.8.8:53 apis.google.com udp
NL 142.250.179.206:443 ogs.google.com tcp
US 8.8.8.8:53 196.168.217.172.in-addr.arpa udp
US 8.8.8.8:53 195.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 14.214.58.216.in-addr.arpa udp
DE 172.217.23.206:443 apis.google.com tcp
US 8.8.8.8:53 i.ytimg.com udp
NL 216.58.214.22:443 i.ytimg.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp
NL 142.250.179.141:443 accounts.google.com udp
US 8.8.8.8:53 play.google.com udp
NL 142.251.36.14:443 play.google.com tcp
NL 142.251.36.14:443 play.google.com udp
US 8.8.8.8:53 206.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 206.23.217.172.in-addr.arpa udp
US 8.8.8.8:53 142.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 131.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 22.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 106.208.58.216.in-addr.arpa udp
US 8.8.8.8:53 141.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 14.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
NL 142.250.179.194:443 googleads.g.doubleclick.net tcp
NL 142.250.179.194:443 googleads.g.doubleclick.net udp
US 8.8.8.8:53 98.39.251.142.in-addr.arpa udp
US 8.8.8.8:53 194.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 i4.ytimg.com udp
GB 216.58.208.110:443 i4.ytimg.com tcp
NL 216.58.214.22:443 i.ytimg.com udp
US 8.8.8.8:53 yt3.ggpht.com udp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com tcp
NL 142.251.36.1:443 yt3.ggpht.com udp
US 8.8.8.8:53 110.208.58.216.in-addr.arpa udp
US 8.8.8.8:53 1.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 jnn-pa.googleapis.com udp
US 8.8.8.8:53 static.doubleclick.net udp
DE 172.217.23.202:443 jnn-pa.googleapis.com tcp
NL 142.251.36.6:443 static.doubleclick.net tcp
DE 172.217.23.202:443 jnn-pa.googleapis.com udp
US 8.8.8.8:53 202.23.217.172.in-addr.arpa udp
US 8.8.8.8:53 6.36.251.142.in-addr.arpa udp
US 95.214.27.254:80 tcp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp

Files

memory/436-1-0x0000000002650000-0x0000000002750000-memory.dmp

memory/436-2-0x0000000000400000-0x00000000022F3000-memory.dmp

memory/436-3-0x0000000002430000-0x0000000002439000-memory.dmp

memory/3124-4-0x0000000000890000-0x00000000008A6000-memory.dmp

memory/436-5-0x0000000000400000-0x00000000022F3000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\5E67.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

C:\Users\Admin\AppData\Local\Temp\5E67.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

memory/4880-19-0x0000000004020000-0x00000000040BF000-memory.dmp

memory/4880-20-0x0000000004160000-0x000000000427B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\601D.exe

MD5 aa57bc271352cd6da84865709da432ac
SHA1 7aa710914991c996b1fc4df8c8b633f5bb3d3a16
SHA256 1d7efef95b514586c08757bb66c611018ff59a71ff17f7ac529fbbf2a0fdde13
SHA512 b38e645066bf61ee1cb4f1b68e9bf749afdee1aa15934a2397ad078e0f8c1620196e485c5fde8a9e5df7f8119d2abb5a63b2af16f6e91c939bea95d5813b44cf

memory/3592-21-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3592-24-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\5E67.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

memory/3592-26-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\601D.exe

MD5 aa57bc271352cd6da84865709da432ac
SHA1 7aa710914991c996b1fc4df8c8b633f5bb3d3a16
SHA256 1d7efef95b514586c08757bb66c611018ff59a71ff17f7ac529fbbf2a0fdde13
SHA512 b38e645066bf61ee1cb4f1b68e9bf749afdee1aa15934a2397ad078e0f8c1620196e485c5fde8a9e5df7f8119d2abb5a63b2af16f6e91c939bea95d5813b44cf

memory/3592-27-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\632C.exe

MD5 f80d0dc2fe6ef74e286f99444bd6fe83
SHA1 30d3c3da98bc194650f0709b445863b76edb4fd8
SHA256 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa
SHA512 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b

memory/4236-31-0x0000000000400000-0x0000000000443000-memory.dmp

memory/4236-32-0x0000000002080000-0x00000000020B0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\632C.exe

MD5 f80d0dc2fe6ef74e286f99444bd6fe83
SHA1 30d3c3da98bc194650f0709b445863b76edb4fd8
SHA256 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa
SHA512 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b

memory/4236-42-0x0000000072C70000-0x000000007335E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6494.exe

MD5 7980cd6aa2f009db138977c965cd2c1e
SHA1 dbd57e3756c356abd5723ed000503a38518722d8
SHA256 b547730be7b7d3f9d6e2500930f144e58db1ea4caffeb266ddb60dd30562e8c4
SHA512 799298da85498c8d7868bacaee7a3a262fa339688e25ddf5b6017888c99c6fca2643f93ba0f1cddd2916b908ce4b94416d623ffef7c41a6fe5c0681f17946ee5

memory/4236-46-0x0000000002510000-0x0000000002516000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6494.exe

MD5 7980cd6aa2f009db138977c965cd2c1e
SHA1 dbd57e3756c356abd5723ed000503a38518722d8
SHA256 b547730be7b7d3f9d6e2500930f144e58db1ea4caffeb266ddb60dd30562e8c4
SHA512 799298da85498c8d7868bacaee7a3a262fa339688e25ddf5b6017888c99c6fca2643f93ba0f1cddd2916b908ce4b94416d623ffef7c41a6fe5c0681f17946ee5

C:\Users\Admin\AppData\Local\Temp\662B.exe

MD5 8e80f352faa21ac6bd996e86cd71640a
SHA1 347e8c111508d0095a05328175c0be5b86677730
SHA256 eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3
SHA512 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038

memory/4236-55-0x0000000009F10000-0x000000000A516000-memory.dmp

memory/4236-57-0x0000000004B30000-0x0000000004B42000-memory.dmp

memory/4236-58-0x0000000004B80000-0x0000000004B90000-memory.dmp

memory/4236-56-0x000000000A520000-0x000000000A62A000-memory.dmp

memory/4236-59-0x000000000A630000-0x000000000A66E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\662B.exe

MD5 8e80f352faa21ac6bd996e86cd71640a
SHA1 347e8c111508d0095a05328175c0be5b86677730
SHA256 eb0c08d12d022aea720fe5fd6a85a4f98a5c8bfd75ac93c0ba7b0abf370e5df3
SHA512 17c83f65d57c713f96d65e56467da77d5bf48c1e5e89ea654b50fd74767621a81a4fa0ed5d44331289c4ce8ca8162ad921cedf2c0fab40a402168313a761a038

memory/4236-61-0x000000000A6B0000-0x000000000A6FB000-memory.dmp

memory/496-63-0x0000000000560000-0x0000000000590000-memory.dmp

memory/496-62-0x0000000000400000-0x0000000000443000-memory.dmp

memory/496-73-0x0000000072C70000-0x000000007335E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6C37.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/496-74-0x0000000002360000-0x0000000002366000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\6C37.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/496-75-0x0000000004A80000-0x0000000004A90000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/4648-80-0x0000000000400000-0x0000000000430000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

MD5 55f845c433e637594aaf872e41fda207
SHA1 1188348ca7e52f075e7d1d0031918c2cea93362e
SHA256 f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39
SHA512 5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

memory/4648-84-0x0000000072C70000-0x000000007335E000-memory.dmp

memory/4648-85-0x0000000004F90000-0x0000000004F96000-memory.dmp

memory/3936-86-0x0000000000400000-0x0000000000430000-memory.dmp

memory/4648-88-0x0000000009080000-0x0000000009090000-memory.dmp

memory/3936-91-0x0000000072C70000-0x000000007335E000-memory.dmp

memory/3936-92-0x0000000009620000-0x0000000009626000-memory.dmp

memory/3936-98-0x0000000009710000-0x0000000009720000-memory.dmp

memory/3592-97-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\a5839173-1a13-4fe7-86ef-418671591ae8\5E67.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

memory/3592-104-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\5E67.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

memory/4236-114-0x0000000072C70000-0x000000007335E000-memory.dmp

memory/1836-115-0x00000000025D0000-0x0000000002665000-memory.dmp

memory/2400-119-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-122-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4236-117-0x0000000004B80000-0x0000000004B90000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\5E67.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

memory/432-125-0x00007FF7237E0000-0x00007FF723818000-memory.dmp

memory/2400-126-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000070001\aafg31.exe

MD5 b236b8e5bab2445e09876a88d83a995a
SHA1 3278af413aad4772a57a4c33418d504f958465d9
SHA256 ac81724fd3a660ce17e5d5b2b560285e4725f93ecc4d9ed9fcfab041532914c2
SHA512 3d62f525db2d7058a4540f2f4825df9cb211ea7bee399285762af0d8234021605288e8cf15e12fe6d721ead82059fa1fbf7c7a7b672a968888fc8cbe0e478da5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 8cb8f90ec602fd3a3e719cb78d8c7cce
SHA1 cdf764f8683ff175fb19bb0ed9e8765e28033e3b
SHA256 da35784b211cae7f4696f5b33b9b2ba9295bfa1016ad92ed28a3d588c1c84651
SHA512 939433b40ad73f85b50268616a1717dc3be47087450d7682b4dab5a657a4279a9a61d706b5e6fc24183995a27ab0803d704e0f2fde6e450d3b05d8b4c0bd6395

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

MD5 7c32dab46bd482647af8a22bbb4830a5
SHA1 c112cf6d9bdb2b3be93babc9c0ed1b157c8bd599
SHA256 36842cbc8d2fab90bf6bf3ad6b302d55472a46fb982a77f13b391d8593c7b390
SHA512 ce7158ca3ff1e702d541e2d57c3e5d794b41f269f2df79edefb093fdfde11f41b2113fddac8ba447c6ebd02d938e27dee3f6396d4071a6845187c1d7e88523f4

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 9622537e51915638708894cb1125d8df
SHA1 9866d52f44d3eddd426d2125939aeaf4e4d7d5dd
SHA256 2dea83fc2e4deded477b919a973aac3082d7dc0d4dc1f213ea867245912b928c
SHA512 1a494c161fc0b2480863c80432bea118b9ea1973db86833c74cbb8342b561fea296f5235362417fb755c9bf9856337da5edf8284ab6dd41692c16f36b37f38a7

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

MD5 41ff598250840b4254e0b3766b454833
SHA1 20dcf384126db195eb3da556c28bf56b7f1745e8
SHA256 0737137c4c4ef522867aebd0416c1371e036f7e27cf5d20d410434885f898568
SHA512 aa872e5a2b5e3c9cbe5bec38be5e07d1bf27d31f28457b7b3b19a4c835f87824ed4f5e0420f9351f9738596d1d635d8ff802803b87f8678f8dc1af23136a5724

memory/2400-131-0x0000000000400000-0x0000000000537000-memory.dmp

memory/496-133-0x0000000072C70000-0x000000007335E000-memory.dmp

memory/2400-132-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-137-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-139-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2400-140-0x0000000000400000-0x0000000000537000-memory.dmp

memory/496-147-0x0000000004A80000-0x0000000004A90000-memory.dmp

memory/4236-148-0x000000000A7F0000-0x000000000A866000-memory.dmp

memory/4236-149-0x000000000A870000-0x000000000A902000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\8473.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

C:\Users\Admin\AppData\Local\Temp\8473.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

C:\Users\Admin\AppData\Local\Temp\8473.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

memory/4236-154-0x000000000A910000-0x000000000AE0E000-memory.dmp

memory/4236-155-0x000000000AE50000-0x000000000AEB6000-memory.dmp

memory/4648-156-0x0000000072C70000-0x000000007335E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\8678.exe

MD5 f80d0dc2fe6ef74e286f99444bd6fe83
SHA1 30d3c3da98bc194650f0709b445863b76edb4fd8
SHA256 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa
SHA512 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b

memory/4648-161-0x0000000009080000-0x0000000009090000-memory.dmp

memory/2188-162-0x0000000004080000-0x000000000411A000-memory.dmp

memory/3960-168-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\8473.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

memory/3960-171-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3936-169-0x0000000072C70000-0x000000007335E000-memory.dmp

memory/3936-177-0x0000000009710000-0x0000000009720000-memory.dmp

C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

memory/532-181-0x000001DE473A0000-0x000001DE47460000-memory.dmp

memory/532-186-0x000001DE49020000-0x000001DE49026000-memory.dmp

memory/532-185-0x00007FFC07700000-0x00007FFC080EC000-memory.dmp

memory/3960-187-0x0000000000400000-0x0000000000537000-memory.dmp

memory/532-184-0x000001DE49050000-0x000001DE4906A000-memory.dmp

memory/532-182-0x000001DE49010000-0x000001DE49018000-memory.dmp

C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

C:\Users\Admin\AppData\Local\Temp\8678.exe

MD5 f80d0dc2fe6ef74e286f99444bd6fe83
SHA1 30d3c3da98bc194650f0709b445863b76edb4fd8
SHA256 3ca4b678e40e02cf19a8f52b171e699e3fcf7532019c9cad7cf02443aa7847fa
SHA512 48ef97586cd55b57a63122a772359c947b83f2578da2a374e46f1be0d829ec936ae28309296d29bc387b704794e8db3431fab003958c687b02356898cd6c797b

C:\Users\Admin\AppData\Local\Temp\88DA.exe

MD5 b7a9dd705bcc0dbfc9cabc69b2953b33
SHA1 bb0c29b2169c908b8d25637651eeaa32135e0b80
SHA256 aeb52394baaa77dd4761926e2ae17bdb10423408fac0256159ea61b18c3b5e3d
SHA512 62140abc3a36ee8593b59389a5b98ebc9baab411c6c5f466d3a4291f7a89c4cff469373a5a1dd530df9decdee165480834cb7323dd78728eadee52acc8f2eadf

C:\Users\Admin\AppData\Local\Temp\88DA.exe

MD5 b7a9dd705bcc0dbfc9cabc69b2953b33
SHA1 bb0c29b2169c908b8d25637651eeaa32135e0b80
SHA256 aeb52394baaa77dd4761926e2ae17bdb10423408fac0256159ea61b18c3b5e3d
SHA512 62140abc3a36ee8593b59389a5b98ebc9baab411c6c5f466d3a4291f7a89c4cff469373a5a1dd530df9decdee165480834cb7323dd78728eadee52acc8f2eadf

memory/4060-190-0x0000000003FD0000-0x0000000004021000-memory.dmp

memory/4060-189-0x00000000024F0000-0x00000000025F0000-memory.dmp

memory/532-191-0x000001DE61990000-0x000001DE619A0000-memory.dmp

memory/3084-192-0x0000000000400000-0x0000000000465000-memory.dmp

memory/532-188-0x000001DE61870000-0x000001DE618F8000-memory.dmp

memory/2400-195-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3084-196-0x0000000000400000-0x0000000000465000-memory.dmp

memory/3084-194-0x0000000000400000-0x0000000000465000-memory.dmp

C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

memory/432-202-0x0000000003730000-0x00000000038A1000-memory.dmp

memory/432-203-0x00000000038B0000-0x00000000039E1000-memory.dmp

C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

memory/3084-206-0x0000000000400000-0x0000000000465000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\26148c00-3fa9-4b4a-b0bb-a01245bc39f1\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

memory/2400-210-0x0000000000400000-0x0000000000537000-memory.dmp

memory/496-211-0x000000000B530000-0x000000000B580000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\958D.exe

MD5 6720af0c9b066e60aeec0720cf640f19
SHA1 92dd17bebdc86ba605b314636634e5ac1352e508
SHA256 f16b46e15c651028ea359e8e0fa8c1b460a09570df3a29287d816c688cf1bce5
SHA512 18924eb6bb0ae07f1eead5eef93de572bd276c992fcc6186267aeabb02bcbd7781757b22848c671f327d1ee069c9b693e7cb261bf3245747cfed83afe7cbbe79

C:\Users\Admin\AppData\Local\Temp\958D.exe

MD5 6720af0c9b066e60aeec0720cf640f19
SHA1 92dd17bebdc86ba605b314636634e5ac1352e508
SHA256 f16b46e15c651028ea359e8e0fa8c1b460a09570df3a29287d816c688cf1bce5
SHA512 18924eb6bb0ae07f1eead5eef93de572bd276c992fcc6186267aeabb02bcbd7781757b22848c671f327d1ee069c9b693e7cb261bf3245747cfed83afe7cbbe79

memory/4316-219-0x00000000023A0000-0x00000000024A0000-memory.dmp

memory/4316-220-0x0000000002370000-0x0000000002379000-memory.dmp

memory/4316-221-0x0000000000400000-0x00000000022F3000-memory.dmp

memory/3852-227-0x0000000072C70000-0x000000007335E000-memory.dmp

memory/3852-238-0x0000000006910000-0x0000000006920000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\9DEB.dll

MD5 29a6feecd31507dcbf3355f6af904f10
SHA1 255c9a34e25e24c426efe0cb2a7000761de4b95d
SHA256 3224f041256733ebd84c7881b95bb107e1c2cfb14de5c1688591fbb8888d9082
SHA512 e5ff8abe366b5995c97f7d2478fd833ce77e88deda668cb1280fab5bf94f0ee78b8293cdef9b2af83364d25f16d42e78bcfddc83028af67b0cf08b6e65b0edf6

\Users\Admin\AppData\Local\Temp\9DEB.dll

MD5 29a6feecd31507dcbf3355f6af904f10
SHA1 255c9a34e25e24c426efe0cb2a7000761de4b95d
SHA256 3224f041256733ebd84c7881b95bb107e1c2cfb14de5c1688591fbb8888d9082
SHA512 e5ff8abe366b5995c97f7d2478fd833ce77e88deda668cb1280fab5bf94f0ee78b8293cdef9b2af83364d25f16d42e78bcfddc83028af67b0cf08b6e65b0edf6

memory/4140-252-0x0000000010000000-0x00000000102FA000-memory.dmp

memory/532-255-0x00007FFC07700000-0x00007FFC080EC000-memory.dmp

memory/4140-262-0x0000000003370000-0x0000000003376000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

MD5 39ad210451d748bf993549920c723a0f
SHA1 96897d5a8cd21ef0f71c1c40159cff9373855508
SHA256 b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a
SHA512 d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

MD5 39ad210451d748bf993549920c723a0f
SHA1 96897d5a8cd21ef0f71c1c40159cff9373855508
SHA256 b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a
SHA512 d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024

memory/4504-281-0x00000000041D0000-0x00000000042EB000-memory.dmp

memory/4804-288-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

MD5 39ad210451d748bf993549920c723a0f
SHA1 96897d5a8cd21ef0f71c1c40159cff9373855508
SHA256 b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a
SHA512 d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024

memory/4804-291-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3124-296-0x0000000002770000-0x0000000002786000-memory.dmp

memory/4804-293-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4316-303-0x0000000000400000-0x00000000022F3000-memory.dmp

memory/3960-321-0x0000000000400000-0x0000000000537000-memory.dmp

memory/3960-338-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\8473.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

memory/4168-365-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4168-368-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\8473.exe

MD5 f2438a95fee80045604af453bc9d0fd5
SHA1 37710cc10f12a60f7f27f788eb6eefd85c228593
SHA256 d3a988e97c5a72769f2a1b8962eb92c9c381e36f620b111e39fdcf187a6219c8
SHA512 7e53d081b740b2dbae8318764268f67a842f0d50aa8f3a9c5478259353816099f43d8b8e84ea56e7bbde18600f647128280fbdec8fb7e938b96f6ce5d8cd3ff5

memory/4804-484-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

MD5 39ad210451d748bf993549920c723a0f
SHA1 96897d5a8cd21ef0f71c1c40159cff9373855508
SHA256 b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a
SHA512 d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

MD5 e49363be96a39de62876e4b1adcc0087
SHA1 298c43845f3ede76589c47495e2e7a2918ccc684
SHA256 ec17de230ef7dd522a828d76352ac9d2b98d9fb01122c0b19386e0ebd2e2459f
SHA512 869ad2034367c3bd7d096a1163950d29acd68a76769e56d5aaf4113005335e034d1cf1db3f27c75f960559629df58833104921a3afb885c92ce684e14af90b92

memory/4156-520-0x0000000000400000-0x0000000000537000-memory.dmp

memory/4156-516-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A5BC.exe

MD5 39ad210451d748bf993549920c723a0f
SHA1 96897d5a8cd21ef0f71c1c40159cff9373855508
SHA256 b1190ed46fe58679028a9df4ca56c631f32a0726ce8db6c3f16976931413246a
SHA512 d5be30e11ec719da28ea70b9172749563541b1f61fd79591d026f6f164e503255a4e12f9b3d00c581cd237bc8684909d88801341af9104aa69c4b6e55d918024

memory/4168-547-0x0000000000400000-0x0000000000537000-memory.dmp

C:\SystemID\PersonalID.txt

MD5 324770a7653f940b6e66d90455f6e1a8
SHA1 5b9edb85029710a458f7a77f474721307d2fb738
SHA256 9dda9cd8e2b81a8d0d46e39f4495130246582b673b7ddddef4ebecfeeb6bbc30
SHA512 48ae3a8b8a45881285ff6117edd0ca42fe2b06b0d868b2d535f82a9c26157d3c434535d91b7a9f33cf3c627bc49e469bf997077edcfff6b83e4d7e30cf9dea23

C:\Users\Admin\AppData\Local\bowsakkdestx.txt

MD5 e3c640eced72a28f10eac99da233d9fd
SHA1 1d7678afc24a59de1da0bf74126baf3b8540b5b0
SHA256 87de9c0701eab8d410954dc4d3e7e6013ca6a0c8a514969418a12c21135f133e
SHA512 bcb94b7ba487784d343961b24107ea17a82f200961505927ef385caeb0684fbbe1a3482b7d0af7f3766b9ec2c4d6236341b50541cf7b1217acdc0a8b5b37e3d7

C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\Users\Admin\AppData\Roaming\rhvgvds

MD5 6720af0c9b066e60aeec0720cf640f19
SHA1 92dd17bebdc86ba605b314636634e5ac1352e508
SHA256 f16b46e15c651028ea359e8e0fa8c1b460a09570df3a29287d816c688cf1bce5
SHA512 18924eb6bb0ae07f1eead5eef93de572bd276c992fcc6186267aeabb02bcbd7781757b22848c671f327d1ee069c9b693e7cb261bf3245747cfed83afe7cbbe79

C:\ProgramData\78379236806935515132297620

MD5 c9ff7748d8fcef4cf84a5501e996a641
SHA1 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA256 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512 d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\3aca4658-00cc-44ba-bb39-e40a42b2bd9e\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build2.exe

MD5 d249cebde9fcfcddb47af02d6c10f268
SHA1 0c6a6a81326d9634b55e973cc4b0364693e9df53
SHA256 34e9b76c568bed90396850a59f181edb5233a045c1042fec1e29a42d8449cd40
SHA512 dfd33206b441eb51bd6c4544a11089d0f6754b124c43b7a33d6c7b3fd0de940df2e162337585dc7df66ac4ffb82fa404f140b877f531669bc84a9f8d1487a246

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\e0e71cb0-dc87-4d0a-bebd-f8a89a62e1b1\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\ProgramData\mozglue.dll

MD5 c8fd9be83bc728cc04beffafc2907fe9
SHA1 95ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256 ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512 fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

C:\ProgramData\nss3.dll

MD5 1cc453cdf74f31e4d913ff9c10acdde2
SHA1 6e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256 ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512 dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

C:\ProgramData\24251209750997795529235754

MD5 d367ddfda80fdcf578726bc3b0bc3e3c
SHA1 23fcd5e4e0e5e296bee7e5224a8404ecd92cf671
SHA256 0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0
SHA512 40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

C:\Users\Admin\AppData\Local\Temp\1000071001\toolspub2.exe

MD5 a137245d8bc8109c4bc3df6e2b37d327
SHA1 ed8973e65b2aacb60683787831de37e7c805fa6c
SHA256 f342950ea78a3910911df852de530912090acea09b895e299d4ba0132ee146ee
SHA512 5d83e91ac5862c62d5b90418a75feaedcffb01aa2a396d1cb71c11d9dfbfb0e415d38687ce0736b7159f874835ace02f27d11067b2ab6b81f58a948f10fabc00

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\000001.dbtmp

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 3c8559b859899ac2328ad32a5ad3bdcc
SHA1 d2959182d1b2e1d34fc2b6a430de7af30e2f093f
SHA256 00b41e226f29cf5a91fffc361305451873ad24d2faed6a346d2e362858b7a4ea
SHA512 6786b6976111655d1678d3ecfa771e7faa144f0d9fb5ce739becf59059db10eb698e3ff6a051ac275e135f74bf6b4b50f35fb19cde8d17b0a96d6b4549e053f4

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Service Worker\ScriptCache\index

MD5 54cb446f628b2ea4a5bce5769910512e
SHA1 c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256 fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA512 8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Service Worker\Database\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 7c2493b5fc275b4fe7137e3ef4f5ebd9
SHA1 5a5352797d653dc906f00c7723fa325d6a663240
SHA256 786d8e0d5254e32c2f03ea16d939a9bafa8982febf8807cf776aa90b4eb74483
SHA512 def62fcbe48da31f5cd0340802a568dffa0cc777d600bdcb09bc6c3d746543763d2fdfafca399ba7ef28dfba152915d361613563035367bc35cae2aaeca24512

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5a185c.TMP

MD5 9a88210ad571a3ea99ddf196e41df549
SHA1 e5947ae609a07b1bc1d12c51340cd90b5307db47
SHA256 3c6cb6596a43d634ea65525e57830d7d2109b335b2b8c01c37004a236f891926
SHA512 22c4da4c32b8f5bd5de30b6506d7a0c9f3da92c5763ebff13192d38dbebbf2c8e97b4bcf19aac1915a2f2a7f7da74363dc292118916310ebc313345bd9569251

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Service Worker\ScriptCache\index-dir\the-real-index

MD5 8ba831a6ed59b41a7021d8ea8b9a0685
SHA1 807f7dd5cb5bfef29c71a0a999874dc534868a56
SHA256 82d9e7f1f7a23b8783a037377454cfd7c6a53bc621f1f6a401949b38609e0150
SHA512 a5abc4d5eaf197d46df4b31b9ac6e28d262167b65b0c39b528edf5339c89f190659417f44a126219746475f44c0844084ab2ce45d50cf296b20c354a4d1b48d1

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\159ca128-ac5d-4e8b-bf92-ce5eb9993bef\index-dir\the-real-index

MD5 a2dad8fed2d57945c78082260884bf0f
SHA1 2b2fa270aef796178576ace7c59fe0fbee1ce454
SHA256 8be68ba9b0ebea4226418507ede70a2785b03370f2d1bf033df2805cd074e7f2
SHA512 0bdae827496d027347202e9917ad75296d337122f19200cd12ec395737da1d218eaffece4ba5cf70557279e103c1d9892fc270b5824c076ee536b617157be378

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\159ca128-ac5d-4e8b-bf92-ce5eb9993bef\index-dir\the-real-index~RFe5a2879.TMP

MD5 81a36a306763e5d78fb1b3f467742f70
SHA1 071167cd4e049d2c1d5ef546e2e060b92fe11434
SHA256 c319174c4b77bbdbf1360941374898e6e2a26d70e339c2441581e9c58f51943e
SHA512 5c89299aa4844c4e7f42dd92b06e796ef802c11a35ba80e49f393b3cb94dbd7dd32932c88ef75cba342642a6c4d87f54bfb4f380ecb7037de5c1e127f16eb389

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Code Cache\js\index-dir\the-real-index

MD5 22c5371d71120762e3699d4c4bc3b3da
SHA1 2cf5c23b99db8663f7724d8119f3731d61d623ea
SHA256 ecdd5321dcf39f19e74f075f8cc17d08edbfef0c181311c0e0c7287e0f81c65b
SHA512 257bb4abd62d2792d5ac2b2330ee8074fba2f49156aaeabe2932e45296eda60f687b76c2429b03acc9382bdfed76838e366a2aa62ca37dbedc14b3d6d0467358

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

MD5 996df8ce80feb471b11089c6905889d0
SHA1 7040bff48ad203da7a2cdfaa046f766bb771ecc7
SHA256 228474d59ad5682bfadf2942174965dabd4602cf8e6c4856e98a76116ba10289
SHA512 6baf490aeb03e8e762d08a9bb1b5b65d130070b2a83b460cdbeffdee56f8837dbc5a7444fb6e1b6e3774fa4585d8cf64951cc0e683787a6f08f28645bebe55f1

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5a2859.TMP

MD5 cd63c2ea7e3ecb049ef0203101c7b1d2
SHA1 d20709c4d4e6b1b5e2584062ed8486e0891b0eed
SHA256 e30b091ce0e92248c8d00b3fee12fe4f7a28e83a2bf7b0c65399ca58f92c8723
SHA512 64edffe0f494bad89a3fe393db109531bb67a9074d39e55553066e39ebb981dec87b0420d1bba627778f218e1d8d0cb56e27760a2c0319b89e97a2f91f238a05

C:\Users\Admin\AppData\Local\Google\Chrome\User Data04J0I\Default\Code Cache\js\index-dir\the-real-index

MD5 8e986766beb9cabdec930446de48f873
SHA1 aa66b4c6562338a313c5d3280d3e49965b2dbc16
SHA256 3fe08c0123e807ee695561c65cd8d6d43aea161a58d2939b8a4c6a5a0027741a
SHA512 8c8bc7b35b6f1e8a93f6c6335a3c23e436b6b704194358ec2c95151648e7a5a5546688a88c0de38059f30e0e959fc2fc0d8bb66a0d15230c5adfdaef6eb81a56