Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 08:57

General

  • Target

    d45feb2a785ce22c4239c6b4cb0d5552.exe

  • Size

    2.7MB

  • MD5

    d45feb2a785ce22c4239c6b4cb0d5552

  • SHA1

    c208d73acfd0566f1283cda356df21aed89617e0

  • SHA256

    c962f4a4807e758a8aec58941e761019c64945046b8717ac9998993bf48c08ed

  • SHA512

    12de5052546273549a9dcfe9671a9ec41626708578d567a124c4124c3615e142cf403945fb794e69d9db6b8dffc7926275c8d88322ef043ae7b00fd1f4dcebd6

  • SSDEEP

    49152:UbA30MXyFtsKiaYcydNBWnt6jmXfM+9qQhwDPW15M6QRL4ygWS2LYdNFcfT5:UbIXyFximEWt/2YCW15MNZ4ygx2Ejuf1

Malware Config

Extracted

Family

ffdroider

C2

http://128.1.32.84

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.xxhufdc.top/

http://www.uefhkice.xyz/

http://www.wygexde.xyz/

Extracted

Family

smokeloader

Botnet

pub2

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 5 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops Chrome extension 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d45feb2a785ce22c4239c6b4cb0d5552.exe
    "C:\Users\Admin\AppData\Local\Temp\d45feb2a785ce22c4239c6b4cb0d5552.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4984
    • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe
      "C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4392
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1wNij7
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9236746f8,0x7ff923674708,0x7ff923674718
        3⤵
          PID:1204
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3016 /prefetch:8
          3⤵
            PID:4672
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2984
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
            3⤵
              PID:3728
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
              3⤵
                PID:964
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
                3⤵
                  PID:3192
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                  3⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4024
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:8
                  3⤵
                    PID:524
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:1
                    3⤵
                      PID:5196
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:1
                      3⤵
                        PID:5188
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                        3⤵
                          PID:5540
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:1
                          3⤵
                            PID:5532
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16740628562764369849,11562809990776665078,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2880 /prefetch:2
                            3⤵
                              PID:6628
                          • C:\Users\Admin\AppData\Local\Temp\Folder.exe
                            "C:\Users\Admin\AppData\Local\Temp\Folder.exe"
                            2⤵
                              PID:4952
                              • C:\Users\Admin\AppData\Local\Temp\Folder.exe
                                "C:\Users\Admin\AppData\Local\Temp\Folder.exe" -a
                                3⤵
                                • Executes dropped EXE
                                PID:3604
                            • C:\Users\Admin\AppData\Local\Temp\Info.exe
                              "C:\Users\Admin\AppData\Local\Temp\Info.exe"
                              2⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:380
                            • C:\Users\Admin\AppData\Local\Temp\pub2.exe
                              "C:\Users\Admin\AppData\Local\Temp\pub2.exe"
                              2⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Checks SCSI registry key(s)
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: MapViewOfSection
                              PID:3756
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 392
                                3⤵
                                • Program crash
                                PID:5404
                            • C:\Users\Admin\AppData\Local\Temp\Install.exe
                              "C:\Users\Admin\AppData\Local\Temp\Install.exe"
                              2⤵
                              • Executes dropped EXE
                              • Drops Chrome extension
                              • Modifies system certificate store
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4784
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd.exe /c taskkill /f /im chrome.exe
                                3⤵
                                  PID:776
                                • C:\Windows\SysWOW64\xcopy.exe
                                  xcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y
                                  3⤵
                                  • Enumerates system info in registry
                                  PID:5956
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/
                                  3⤵
                                  • Enumerates system info in registry
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:5312
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=2288 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:8
                                    4⤵
                                      PID:5396
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=1932 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:8
                                      4⤵
                                        PID:2040
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:2
                                        4⤵
                                          PID:5136
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3036 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:1
                                          4⤵
                                            PID:5244
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3456 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:1
                                            4⤵
                                              PID:5292
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3444 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:1
                                              4⤵
                                                PID:5284
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:1
                                                4⤵
                                                  PID:5272
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4912 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:1
                                                  4⤵
                                                    PID:3028
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=5308 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:8
                                                    4⤵
                                                      PID:6676
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --mojo-platform-channel-handle=4144 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:8
                                                      4⤵
                                                        PID:6684
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1996,i,17260165302228288364,8566555091389906812,131072 /prefetch:2
                                                        4⤵
                                                          PID:4440
                                                    • C:\Users\Admin\AppData\Local\Temp\jg3_3uag.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\jg3_3uag.exe"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Checks whether UAC is enabled
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:2340
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:1076
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:5032
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3500 -ip 3500
                                                        1⤵
                                                          PID:3312
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 612
                                                          1⤵
                                                          • Program crash
                                                          PID:2556
                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                          1⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:4952
                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                          rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                                          1⤵
                                                          • Loads dropped DLL
                                                          PID:3500
                                                        • C:\Windows\system32\rUNdlL32.eXe
                                                          rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                                          1⤵
                                                          • Process spawned unexpected child process
                                                          PID:2108
                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                          taskkill /f /im chrome.exe
                                                          1⤵
                                                          • Kills process with taskkill
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5160
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3756 -ip 3756
                                                          1⤵
                                                            PID:5368
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ff923b09758,0x7ff923b09768,0x7ff923b09778
                                                            1⤵
                                                              PID:5972
                                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                              1⤵
                                                                PID:5196

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                Filesize

                                                                18KB

                                                                MD5

                                                                0052525dfbcb0d10ea29e0e60e75e101

                                                                SHA1

                                                                930ceebaa2002592dadbf7f71edc6724da9954c2

                                                                SHA256

                                                                5dc9bf3b5c8a9c25a3e01e6bca19f7e3cb44e2928d26bc58faac9904eb1162de

                                                                SHA512

                                                                bdac56ac6441ddee0737e4aa46e86c6de16a53889a230b77c40bf1de0d54732e0a533f9b27b58c956ed880b4307e608a35eb40ef2a483f029a5198c5fc793ebc

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                Filesize

                                                                152B

                                                                MD5

                                                                5e77545b7e1c504b2f5ce7c5cc2ce1fe

                                                                SHA1

                                                                d81a6af13cf31fa410b85471e4509124ebeaff7e

                                                                SHA256

                                                                cbb617cd6cde793f367df016b200d35ce3c521ab901bbcb52928576bb180bc11

                                                                SHA512

                                                                cbc65c61334a8b18ece79acdb30a4af80aa9448c3edc3902b00eb48fd5038bf6013d1f3f6436c1bcb637e78c485ae8e352839ca3c9ddf7e45b3b82d23b0e6e37

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                Filesize

                                                                5KB

                                                                MD5

                                                                44f097a79c6d4dc169a4faad1ddf4bfd

                                                                SHA1

                                                                6f02874abd76515a6401eb6d15cf833942de0469

                                                                SHA256

                                                                465871ebcb38bc5c79b3aefc2064114c512b27c657c0c740d86260c3e700bf71

                                                                SHA512

                                                                15375b537aa0d0b4d46d8321715a72103c64a4f616762c7c02c9785be7fd0ea07021909dc8ce28c5254cffbb96a97c9dcd0157395c42bdcabe79895498c7676e

                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                6e50fd9ad63a3da47cd5f666fddd538d

                                                                SHA1

                                                                fdb6300bf36c9f5de0fca05f08aea340419b21d9

                                                                SHA256

                                                                3960c65147053a1e4b0c1b7f24b8125f872c538da61a1650cfca8c902857fe60

                                                                SHA512

                                                                6349d568843e01411897eb07967f776a7ab3d4382cbd876b9fa419e24b50a479918b0c19117b3621dc86ebead4fc79b77e2e8dd10e1e5924095ffbf639a2b7ff

                                                              • C:\Users\Admin\AppData\Local\Temp\Folder.exe

                                                                Filesize

                                                                712KB

                                                                MD5

                                                                b89068659ca07ab9b39f1c580a6f9d39

                                                                SHA1

                                                                7e3e246fcf920d1ada06900889d099784fe06aa5

                                                                SHA256

                                                                9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

                                                                SHA512

                                                                940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

                                                              • C:\Users\Admin\AppData\Local\Temp\Folder.exe

                                                                Filesize

                                                                75KB

                                                                MD5

                                                                77307eee3b9c9a152b091ffe9fe99225

                                                                SHA1

                                                                33a1adf1e37603a43c10367d776970bad8c02f7d

                                                                SHA256

                                                                c3c884ed332d0709229031ff87cf0ae9907b132b7f7cf913000d1d0e0122d6f4

                                                                SHA512

                                                                4f612db3c5b72a2ba30738ed796aef579064ce6dfb089f830b7e99cacc7ce84a39267b35e7882ac61b234fcc3e732b3ceaec4e3eb754514bce0cf1939c893238

                                                              • C:\Users\Admin\AppData\Local\Temp\Info.exe

                                                                Filesize

                                                                804KB

                                                                MD5

                                                                92acb4017f38a7ee6c5d2f6ef0d32af2

                                                                SHA1

                                                                1b932faf564f18ccc63e5dabff5c705ac30a61b8

                                                                SHA256

                                                                2459694049abfe227ddcf5b4d813fe3ae8e1e9066de5228acf20c958d425c2e1

                                                                SHA512

                                                                d385b2857d934628e1df3ef493b3a33e2a042c5974d9c153c126a86a28fc61bcc02db0a0791c225378994737a16cd35b74f217600d4b837cda779200c9faeb73

                                                              • C:\Users\Admin\AppData\Local\Temp\Install.exe

                                                                Filesize

                                                                92KB

                                                                MD5

                                                                ed6b3775fb6f4dcbebddbf8566542af9

                                                                SHA1

                                                                438a1a5ec72c0a8bc51f0442e116c2da1efb63c9

                                                                SHA256

                                                                1f74cf47f9559d398f507dada24938197d3066419957c8aa291ac2c5f6982996

                                                                SHA512

                                                                6d112150419387bba56d1423e7ebb4439d6f05692e7e9e6bc2b82caf482b49fdb052574c106fc73868004a8e8923ece9e4f6f94b7dda6658d519cbdcb503f4e0

                                                              • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe

                                                                Filesize

                                                                117KB

                                                                MD5

                                                                8a451a0afa461197efcc17ffb2ce9def

                                                                SHA1

                                                                324fe909027ee0de58562ff5ba9d9ec716de4d70

                                                                SHA256

                                                                0d43ada60d3cd8a55ae3a701869b460a018b93a735a3062911f1a69d19bd5d02

                                                                SHA512

                                                                25f1fbdf3bf4fcc047382e88127df774b7e16d528d76cbb4a64cb9c8b22b377358313586dcdfa26d0b9a85f23f76b200c3ef2244995ed35a05e5b207836ab041

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                48B

                                                                MD5

                                                                c07828b04fe26df34ea58d89a71f6ae7

                                                                SHA1

                                                                c138bcfc4b3bf5eeba1fa97401bef4f63fbfb1f2

                                                                SHA256

                                                                a6c929544d2d339a4402faaed0afbd73d384fa28b4f7affa24ccc3b172210f3f

                                                                SHA512

                                                                230009cf3842539c35da392c6334d7029439fe2f057c28809afd7d1fb8cc99102860a75037d35e285873501de8816119a8b65d56749bf2061f81f7c29fe2a0be

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\js\index-dir\the-real-index

                                                                Filesize

                                                                720B

                                                                MD5

                                                                66219e5cca02e04efa5f3b74ff27a98f

                                                                SHA1

                                                                6a09ed3c29ffcf769a09bf7ae3e80be5de01f4f9

                                                                SHA256

                                                                438c8b4b2ff57fdf414dc4e2076be91b369cf551b8903c1eeee87b66c984965c

                                                                SHA512

                                                                7e5e6a022c0a755549e5d5d11cd6328e1bca1d37e0f3d4cdbfd2479326c6b9a070932dc1748ef87eee4a1c0625566bf6bff329a61415ef3bff46211735aee371

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Login Data For Account

                                                                Filesize

                                                                46KB

                                                                MD5

                                                                02d2c46697e3714e49f46b680b9a6b83

                                                                SHA1

                                                                84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                                SHA256

                                                                522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                                SHA512

                                                                60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\Network Persistent State

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                6b85fbd541c832dd3d74abc99df13135

                                                                SHA1

                                                                435dad9ae3a6f630f478e72ed988697ae283e6ba

                                                                SHA256

                                                                d3ba122410c930421b0819c2d18c157a290db9a78b7f0ccda79bdc975e551c06

                                                                SHA512

                                                                599a260f79a52883b1117a87843a1ce492e7105efd501312523496f3f33c1b7a612f95814e141104a66bc5016d1660b3ff10f891cc5603ebb2aa306e9a761b37

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

                                                                Filesize

                                                                874B

                                                                MD5

                                                                4c29af3850114ae8a1df355f0f06528f

                                                                SHA1

                                                                f598bdd49062331ec106b0ddb9fee442dce96a89

                                                                SHA256

                                                                fbabadcf8e0ee3b3258c3adbf3ce03ca9b88c11c2d358f9b7171e69a24d90cbb

                                                                SHA512

                                                                8a337ef3bf93c1cb2a8fe5cd69a8b6092fb446fff785b3e2efd2b1a146cf67f63cef12a86f78e48baf02a2f91df3ffeb3db36f589563fcc87a6a5bbbf17c2cae

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

                                                                Filesize

                                                                874B

                                                                MD5

                                                                10351392ec0d2db925df4792610bb884

                                                                SHA1

                                                                8303bb5b80f4e7f69825d975199dc39014688d4e

                                                                SHA256

                                                                5e55f8bbeef462b11446391723dce4d913d8f95fcacd35edef49dfe4e67fdde1

                                                                SHA512

                                                                dc6852cf683652fa16276fc2773cdb9dcf974bbb6d9b21575afcd0aaeadeac22f3b67fadc8d09a76490123ed597b12a0a462eda49f232a888d19a42b5bfaa41f

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

                                                                Filesize

                                                                874B

                                                                MD5

                                                                b4b79c988b36bc969508642caa37ecd5

                                                                SHA1

                                                                1b7011b81eefa5cef38303b6c2b6cbef61d1dcf4

                                                                SHA256

                                                                dc5d73ff096b50b848ac66f9cf70e569451126af9f5e124e2ae891411f3e139a

                                                                SHA512

                                                                3ba2ab55b71035f88aa51b4399c60fa61f1329f43f22d83bf03cfe9c245b217a9f7f6268f4dcb65703dc66ca76202f0073e1219dbe65a88daa5ebbbb80fcd10e

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                32cb8ebf2d3c71611234580485c4ce2c

                                                                SHA1

                                                                da6ff177c1d4fac2c4b6730aae3411c82db931bb

                                                                SHA256

                                                                d243748bf8bae9e0d209655be45543cc219253eaca97e0dadb62ddec1c70a600

                                                                SHA512

                                                                af3c4301470cc265c71a298f7dd309c431820d2365350553ddd83c0c7950a109d5843eadf35f525beccf7afd2279cb9c8c9be27a1828ea2a1b292c279c7c68db

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Secure Preferences

                                                                Filesize

                                                                15KB

                                                                MD5

                                                                6d773a7e16c0ec86bd617e750696e0a6

                                                                SHA1

                                                                426ec98845271dcf5046563113883a20246483ac

                                                                SHA256

                                                                1bc10b51d2727f0554a3700b27007491f6b6718cbbf2f4eb93f024b5401cb71b

                                                                SHA512

                                                                fc661729de48e042dc95b358d5be5ecb8913443b83ac8c21efd9d9dce7526fc7bdd875a3fa7c061e228c83d426b83fdd02334bc665b33ca8213fc5b764343bee

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

                                                                Filesize

                                                                226KB

                                                                MD5

                                                                499e3c680e5c0f4f0bd11cfcf2cf0abc

                                                                SHA1

                                                                443608fcba3160a34f416552173a7d0fd7244710

                                                                SHA256

                                                                0faa848898aa750ff5bd99e63916f90eb94e878a8e3b5c2d75d21ad438510dbf

                                                                SHA512

                                                                823b9ce911f12f616ba396e3cc0b6b2f4615036d4e5deb11ae9d0b3045cb94ea8c70bc5b06533cc70641fc42f3ed926c37d4fd04bee7e31bece184f41b1ad22d

                                                              • C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

                                                                Filesize

                                                                225KB

                                                                MD5

                                                                3a7bbc8c1a92fe7d547c5c6df6bc564b

                                                                SHA1

                                                                ec94fdacc1067059aefcccb7b4a02a08c997b98b

                                                                SHA256

                                                                6a3819fa1e5c1977f9dfb5fccc3ac0c887207455075e21e9acd04568a149086b

                                                                SHA512

                                                                f3b853c680812856857a799ef34d3329b7cde5ed0ade4c82f4d8cdf95caec31f9af70145c6e69984057cfcb8410db05b6c8ba3876b1b137f761dc315113c2cf1

                                                              • C:\Users\Admin\AppData\Local\Temp\d

                                                                Filesize

                                                                2.1MB

                                                                MD5

                                                                a1361724a0566fd4dba719e1c6892634

                                                                SHA1

                                                                d6c1e3ae062896705cd51a18b02c2076bb16b5a9

                                                                SHA256

                                                                cfc2d32ecff806671b7bede7ca0d8d27beb5645c2c4d49c003abc22c91671783

                                                                SHA512

                                                                2f8fd443866261fb1c572e3ca79c18a4017449f6a0a779e5608025849cce15fb9e020a2030f5ae1288f22e49e825e1881f22a759e7c1d42d3ba9891d1bbe0948

                                                              • C:\Users\Admin\AppData\Local\Temp\d.INTEG.RAW

                                                                Filesize

                                                                64KB

                                                                MD5

                                                                d2ef455bd2fb85a2dee3eb8e86c87ad3

                                                                SHA1

                                                                eaf1a8710c9f834939028f8f753ecaee8d87767c

                                                                SHA256

                                                                4a64bc6c21b56a7755cf173593bf15240cbd431ea54d9d785e3a2891a360b7e3

                                                                SHA512

                                                                a626b1650c94ffd966d77f25db041071ec3dfb6329ec14c0a900c44e79d648ef1079baab370f8952482ee023f2b93a44b6fdb9000396068bbbea28bed0cf5767

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                4312997968aa6f56ad8f5dc6d6c42ff8

                                                                SHA1

                                                                b3898b5c9895cb2fec91c91967ab0dcbb3dc8ca4

                                                                SHA256

                                                                38850160b1d14c7dd7b2aff78a55277f63a52b490519d1692564534c7eb404d3

                                                                SHA512

                                                                c49e0b08a08d810edfd50bc7ecd05dc3054c728319ef50db4992387590cc7951714f6067c752fc4ff79d3f14c5daefca226bcaf22018c300ae5ed8721bd820f1

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                ad3886098336835585d36a9531d3d734

                                                                SHA1

                                                                ba4eb0435db062a3688cc2694767dc3bd06cce96

                                                                SHA256

                                                                31b4ffeea14d3d0e923ec5328dbd13dccf9689594b19ad306fd77b95c2a27752

                                                                SHA512

                                                                e9a41b8a49c4f4612098db79e4a306580be112d6a44d730ee0b6dd93ae08f6a0b43d68f4241e907903d2035a616835a3c76c66d0d542c85a51ce3921c19d547d

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                0050d2fbd49c744df48c27f9215aa3d4

                                                                SHA1

                                                                4946947be29d8c757c575bf28e3f8e25bb56907e

                                                                SHA256

                                                                8ea5ceef26908f1ced55bc7f8b53a6e2e70c963ac374c4f7376992968f78145b

                                                                SHA512

                                                                071d4bc30fcf3f3a5ee6689bb6e4997dd08da8cca0e4160a5dfffe69401b86694679b61fdde68c42693aa431af13b769f967255421080f1f45c059a276ee0577

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                f6c252278817d11b2955b5e0263b33f2

                                                                SHA1

                                                                f7b150e63753af8c690f9b290554e11b088f0d04

                                                                SHA256

                                                                718e69608a9e1cbca85faaa0be7c08b4573838af83aafc78823cda7ccc6fc08f

                                                                SHA512

                                                                acf21bc8b8114954b3e954f76c5a1c9451c064c7de6c493786f45d39f4ce52f6bfae157f55e2211958834d7fc3ef49b322ef13069f4d01e6eaa112def722a999

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                03639fe26af5675d00d5745953e66b23

                                                                SHA1

                                                                cf2d86f51e438daf1efc312c62d1c4a6e6c95860

                                                                SHA256

                                                                cef4aa2f6130f23e986d203b4feb04858e4f1da360fb0bd5060b29fcb51f835f

                                                                SHA512

                                                                8f11aada5ce0ff05d9a55ac767095110649f6c588fff1f7386765ac107b083414b4ac7d98f8af50af00dcd25feeca00bb8fb5bcf712852ad6a7bd690b87e0884

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                798986a483b2187122de2626e73c767b

                                                                SHA1

                                                                5867e819acb51660236ba61075cd520e1ecb2888

                                                                SHA256

                                                                4d73345792ab2ed406149d4de7f89d27050a65cad25c07ed0e9cc7ebd47222fc

                                                                SHA512

                                                                9dda5e80a8b6abd54acbe51eb36433902d19c4879f44afdb94a8c35a0e7d3c3fb183e8556414b7f24fd5ef1faab10e0814eb663046855ef29ac3885870a9fedb

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                e0e48d8866dddf97af5a34c932fb2b0e

                                                                SHA1

                                                                91c7ce776e3c85917c8404b6b92c54497388ae41

                                                                SHA256

                                                                9baabb2ffdc0a62d9310f0d5b53ca0de49cfcfba5526710d5976e9635f1a1572

                                                                SHA512

                                                                df2137347059a146be37231b2b73e908774b942ee00827a1ee70d544c7081cede01f766f433a158e0117b37690a77f8083c5508ca8faa8ead7aeb6038e112c2b

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                a0214e96a13038d36819c0efb26d4232

                                                                SHA1

                                                                bb147ac9c67e7d7cf01b3b9bf84af30e33b5354d

                                                                SHA256

                                                                5f22ff73b3e3be1b232261fc2986c86bf28bc2c29ff3f05810f18e61aeae13ed

                                                                SHA512

                                                                ba28b6b0135e909552f8ebf06f479f337fb7e5890b548b1e99ae9619a547a53546ddffac3702d3ceae12652aacd59b11fd987730668bb473fb387288fb287eb6

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                73b0da834d013381cf4de6a04385b5de

                                                                SHA1

                                                                22872b15790de404fa8f7a07dbbda5d662833f7a

                                                                SHA256

                                                                e11e97d4f7c2cbff5ec7e032f9319403c8c8fe186759b99fceba57f89ba748e8

                                                                SHA512

                                                                ea334d9579dc4854f17c0ffa593cf974e36f3dc3bfb5d5c9816aa533f1e4a0db56dbd5b888961e0da74c89694b9770f7bc8e081858dc62a5d78ae485b2f869ab

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                1a46bce50b4757b7905fa1f71d5906dd

                                                                SHA1

                                                                a049463f398c5b4b03428fc8fd61c45039110b68

                                                                SHA256

                                                                6d353a6b3f6d900cea2f1d4bf34ef104e301ca9f874b47f5689ffe0d32621ae3

                                                                SHA512

                                                                bf60b430bf5bbc1e71bf4ae71514edc9e36681b867c7e75eaf7251ae1298747efd195701b1948ce747323f94f2118fad832db9647dbc278298e8d8fa287ef021

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                8526121cfe24115a8f60d768ec5f1d88

                                                                SHA1

                                                                f1a84dc36279227051a3652a6e39f9e247227e40

                                                                SHA256

                                                                f4cc0e4f2aca7ec92bcc020cb29d213b08d014a8e4fe9548c0e3b9ed8f10aed6

                                                                SHA512

                                                                764a8bada4377d5b8d36a6ed84468fca6580858f58f852c564c9745cfab43824db45733c9b7077fb71f718c2c8bd7f2bea0f4e5223d4014fefbd9498e915291c

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                fdce4f73622cd2cbcab1611fe3636e60

                                                                SHA1

                                                                b48a80284070b06e26cb6d8f0d5c8dcf2bde9e3f

                                                                SHA256

                                                                1724c05faf01fd781fe420705b3c834d2b0047baab38cb5322af8580f2969aed

                                                                SHA512

                                                                f271c1edcc2b4564817901e8d0ee9ef27596e0aa252eda02b316bca44be41cf0f4149ca4945a9fa6ff66daa5d384e61174dcfcb2677a6de854708bce50e190c3

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                434e1982866efdf046979f04c8e61395

                                                                SHA1

                                                                b79d51addf0731e1fed8c3c211bac0e5a80c99d6

                                                                SHA256

                                                                35ea732be3816322d75bf615dc9b81758cd307d7722e285b87774737f676cacc

                                                                SHA512

                                                                60f05279d34b0e5936b27c92ce5dc0061296350e18fa42443aa03b6191b52d596a4d599339019c2c771f750cccec4dbb813513827285511cb3a94bbfcec85191

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                4b763eb442904a2d55d10dddee95fdc6

                                                                SHA1

                                                                5a0b7aa06e62f24fe7e55a9c8551fbf259cc8b40

                                                                SHA256

                                                                d979b423a4146a706fd934fbd8a8a99c840e6b5b7cb8abbd33d11af96035c271

                                                                SHA512

                                                                d6c777d6708efc2071179ce4b140d3e39cca1f3101b8ce5f3e88221821e84d4ad90969cfd7cf23774a73be13ff8084799e646c34fffab7d705154c8fcb6b40ce

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                bdde38f44888d7a25be9a15ccdc658a8

                                                                SHA1

                                                                dd3d6b972b36cdf568bf81d65d8e36e65cbd5854

                                                                SHA256

                                                                dfa07bf197449a13a4e43a267c9470a675985a39091deb4b40a28984150a7ecf

                                                                SHA512

                                                                90cab187e8bb90b4b780678cf3ae6eb099e0571298da08ca53ba8a9d074061dd1c731975f940c40431844222a6646d3600c6b25f8c24206eeb15928dc56c0847

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                3ee27191947250e4fa9b2a5dfe1c98dc

                                                                SHA1

                                                                eae6d698bb71d9690f53c16dbae49bfd66b7cce8

                                                                SHA256

                                                                b53ca00a36588dae7556696bb91e9a500b989c14f49077cc40fe9b45a2f1f7f5

                                                                SHA512

                                                                25eb92e31a9d26dc76fec04d5bdb47912c7a223d23e3ac79639a56f105215dc2550fb2c05b4db955990b47f601c490a48107385967a46caadff1490c6e52e79e

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                e4d090085667222258c898eb0d71d2c6

                                                                SHA1

                                                                f8a3d2592e9ff95f004d098da4190fa5ebc6ec6e

                                                                SHA256

                                                                3179e8f3290cd8425644d00dd474a458cd0882e940a9227d3f18db2132555b0b

                                                                SHA512

                                                                0e422dd45bdf02ac4174f47ed76e79044675d33a5b3665adb5f93f8467f5c9afb5323ee18d497ad6abc4ca6d69275304265b524a13faf020b6fbe20bd7890aa2

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                ee0c0494edad4300b45f2356edc7c834

                                                                SHA1

                                                                681ea1df991af92c373a75d99e4b23d18a52ab62

                                                                SHA256

                                                                9f86508f98457f9464115682956c97d0eb72958aad7963ad050665dfc7c1c457

                                                                SHA512

                                                                8a2c794d9fe34fb102a5021f48fabdd7c8e9d21e2cd36e434069dd528975bc21f15db08931c1caa4a289f51fe43f816c045e722ba60c4a869002e5130c4af73c

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                489cd246ed06b2f75e4b9b4438ace659

                                                                SHA1

                                                                093f8cab44f47ae4f154a2656288721c3121e349

                                                                SHA256

                                                                a891a093fd63902288b2dca2712e49cd07bddd459645371b088727f0666c5580

                                                                SHA512

                                                                f16e06220c47e2bd5b30e1b50052481543934c64b4efe3228bc546fb7229c4f47a352857b47f3555073e51b12c295f569f0ad2ae3af3f9e4976a0785fb77b32a

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                db01623ab6e8f3e7f16c5e9bc41ae7d3

                                                                SHA1

                                                                57cc41587270535fcc2c7905dccf1757c80bfa72

                                                                SHA256

                                                                a96cf3dbc16a15ecc4a738638b2d301f42d3f8e4634f52fbe99c9e503c842131

                                                                SHA512

                                                                ab14f8fadf0619a090a7db45cb878fa69b1c9249ed16723b57bb06474f8dafd159852d4a470401c3456fb53ff62ca0df3eb4dff4171dd7b3f4ab78a031ebd210

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                dc8aa45d5c599fc007dd9bc08e82bde1

                                                                SHA1

                                                                d30001c8f8cffc4083a6c030f0864b04c3307f41

                                                                SHA256

                                                                f6e2e6bd35197e9c4a1c1c9c90063ab11e976b88df09cb35792d803bdd6f962b

                                                                SHA512

                                                                dea1034aa600effa5a1b20b6e7f7e23793e929b07902b789aa7832285a5a71fed46fc8e1d3a7532c4f42ee3abeec9df518b37341e71358b51e984b51f6088c9f

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                1927b3de3db444990bcd2820699d3d66

                                                                SHA1

                                                                c600b1b8ad289fdd20701fab8e994a8e756dd389

                                                                SHA256

                                                                5f9f7c5d0054c6ae305b87efffbfab68411831a2f88aa66357479ab9b8af69d0

                                                                SHA512

                                                                a8990feb8525c6789b3e9e4fc5e7811ebc8964b88a75c4d1ffb9bd1a374d07803a75cb36718698e96431f29cf7bef7f37e7927392d30bf8f09d7c7bb3c859cc6

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                d14704ee7cd328b1ab432afe240172a9

                                                                SHA1

                                                                44faa9e99cc2407a2311e9dce06c76931f8abaeb

                                                                SHA256

                                                                56e1aba02357269d0e33d562f7efa6e16b2f3fd0c8d5bcc7b457d82c5dfe7436

                                                                SHA512

                                                                c6b2f52d2b47d5b7fa739d931fcfb8daf9409aef3dc1fa0e054508aceef6076a6b634da334c21f378fc335ee66779565c044a1ae9e89d7f0e7d696428ed3ceb2

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                adf4e024388e9626c225f02e176c27f8

                                                                SHA1

                                                                9a1e2bd7588a2aabd40467240171c7463c7e060b

                                                                SHA256

                                                                e53d7c5f403930b1da1a29131f08ed6bff368c89fe7b79a9cfda7cf06626feb5

                                                                SHA512

                                                                e65dc7d624d412d37185022064198cc88f2e444eb2f3daa2e986d538b2cff93cdec98f4b31de25efab7178da87568e3dad3c9a719b83776044516a5a473f79f3

                                                              • C:\Users\Admin\AppData\Local\Temp\d.jfm

                                                                Filesize

                                                                16KB

                                                                MD5

                                                                e7fd0bed04d53f7f7db5fa7504baddec

                                                                SHA1

                                                                8cbd76a2c0c17aa1f3bfbe9b40e03eaf7eae83dd

                                                                SHA256

                                                                b270975bfae4c76a43c090724404ddc79c4cbbbc356917f448b1b5c8b9e0873b

                                                                SHA512

                                                                50a32cf11253d46cee707e735f46bb95248a242884f611056934b1606f99a431e5933becd8c2c31d5ac400dc8780b76aff1b73df2b4e2fab321ce0e7484ab771

                                                              • C:\Users\Admin\AppData\Local\Temp\jg3_3uag.exe

                                                                Filesize

                                                                804KB

                                                                MD5

                                                                afd33b39cc87ff4d2e7047e199b911f0

                                                                SHA1

                                                                71adba01096df16f501b202b07d24d5c3fee37df

                                                                SHA256

                                                                22221d5e43e091a1c03113d1bb37d8dd95dcf07d8756c87d2df6c0d1ab944845

                                                                SHA512

                                                                9802fdf92b9735740bf23b943fd9fa15c374d09a2a13c90823a96654cc0a3fd157148b9600153d66721ee57023227339c30bab4cc7780737cd8a0a9844be3671

                                                              • C:\Users\Admin\AppData\Local\Temp\jg3_3uag.exe

                                                                Filesize

                                                                381KB

                                                                MD5

                                                                827d4a214b7e54569521996cd5183077

                                                                SHA1

                                                                ecb2bd7f872fa6ae832cf0eb57fda95172515cdb

                                                                SHA256

                                                                7a6c3ba9cfacc48e9f477016abc4f7b8324ec3da190701a186f59d59cd882a4c

                                                                SHA512

                                                                c32d97ce23151ab9cbcda28b04e4459379fae309e13dbf29e362724dc1ed243e4408af20f80b27ec4c022c02a03c41d86cc266cc571a4fcda13901bc64179f93

                                                              • C:\Users\Admin\AppData\Local\Temp\pub2.exe

                                                                Filesize

                                                                205KB

                                                                MD5

                                                                7b5fde3161f7a90fa3ddcbcf6ce89b0c

                                                                SHA1

                                                                fda0ddbaaad11d31a05587cf5c8d60c969f9a150

                                                                SHA256

                                                                33e21d150d5b0e6e79395e454fb7dcf287d16a982ee8711f661ac3e01b991acc

                                                                SHA512

                                                                f9663556afae670d04ea68c8c0624f7ed91ddeb9ba183b5eef43a54a330a610463c9ad9537c7d1c63eb4bbc1e0416a1f6db46538571c462745a9f2ce327265c1

                                                              • memory/2340-1509-0x00000000042E0000-0x00000000042E8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1404-0x0000000004280000-0x0000000004288000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1510-0x0000000004390000-0x0000000004398000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1512-0x00000000042F0000-0x00000000042F8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1511-0x00000000043A0000-0x00000000043A8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1505-0x0000000004160000-0x0000000004168000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1497-0x00000000040C0000-0x00000000040C8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1496-0x00000000040A0000-0x00000000040A8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1424-0x00000000041E0000-0x00000000041E8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1434-0x0000000004770000-0x0000000004778000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1447-0x00000000041E0000-0x00000000041E8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1455-0x0000000004770000-0x0000000004778000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1457-0x0000000004640000-0x0000000004648000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1432-0x0000000004640000-0x0000000004648000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1410-0x00000000047D0000-0x00000000047D8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1411-0x0000000004640000-0x0000000004648000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1409-0x00000000048D0000-0x00000000048D8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1388-0x0000000003590000-0x00000000035A0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/2340-1401-0x00000000041C0000-0x00000000041C8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1508-0x0000000004160000-0x0000000004168000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1407-0x0000000004500000-0x0000000004508000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1408-0x0000000004520000-0x0000000004528000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1402-0x00000000041E0000-0x00000000041E8000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2340-1394-0x00000000036F0000-0x0000000003700000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/2340-85-0x0000000000400000-0x000000000064F000-memory.dmp

                                                                Filesize

                                                                2.3MB

                                                              • memory/2340-69-0x0000000000400000-0x000000000064F000-memory.dmp

                                                                Filesize

                                                                2.3MB

                                                              • memory/2340-1908-0x0000000000400000-0x000000000064F000-memory.dmp

                                                                Filesize

                                                                2.3MB

                                                              • memory/3560-167-0x00000000022A0000-0x00000000022B5000-memory.dmp

                                                                Filesize

                                                                84KB

                                                              • memory/3756-129-0x0000000000B30000-0x0000000000C30000-memory.dmp

                                                                Filesize

                                                                1024KB

                                                              • memory/3756-130-0x0000000000B10000-0x0000000000B19000-memory.dmp

                                                                Filesize

                                                                36KB

                                                              • memory/3756-137-0x0000000000400000-0x000000000089D000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/3756-170-0x0000000000400000-0x000000000089D000-memory.dmp

                                                                Filesize

                                                                4.6MB

                                                              • memory/4392-144-0x00007FF9227A0000-0x00007FF923261000-memory.dmp

                                                                Filesize

                                                                10.8MB

                                                              • memory/4392-29-0x000000001B770000-0x000000001B780000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/4392-26-0x0000000002A60000-0x0000000002A7E000-memory.dmp

                                                                Filesize

                                                                120KB

                                                              • memory/4392-27-0x00007FF9227A0000-0x00007FF923261000-memory.dmp

                                                                Filesize

                                                                10.8MB

                                                              • memory/4392-24-0x00000000009E0000-0x0000000000A06000-memory.dmp

                                                                Filesize

                                                                152KB