Malware Analysis Report

2024-11-30 04:07

Sample ID 240407-3va2jaac2w
Target Epsilon.exe
SHA256 b0dd070d0e4961bc47b4623271a6d89377ea95a55d7e6c4a73ce29eb9d847355
Tags
epsilon persistence spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral17

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b0dd070d0e4961bc47b4623271a6d89377ea95a55d7e6c4a73ce29eb9d847355

Threat Level: Known bad

The file Epsilon.exe was found to be: Known bad.

Malicious Activity Summary

epsilon persistence spyware stealer

Epsilon Stealer

Checks computer location settings

Executes dropped EXE

Reads user/profile data of web browsers

Loads dropped DLL

Adds Run key to start application

Looks up external IP address via web service

Program crash

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Enumerates processes with tasklist

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Detects videocard installed

Kills process with taskkill

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-07 23:50

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:53

Platform

win10v2004-20240226-en

Max time kernel

1748s

Max time network

1756s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Epsilon.exe"

Signatures

Epsilon Stealer

stealer epsilon

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsBootManager = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\0\\WindowsBootManager.exe" C:\Windows\system32\reg.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A

Enumerates physical storage devices

Detects videocard installed

Description Indicator Process Target
N/A N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4300 wrote to memory of 3500 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 4300 wrote to memory of 3500 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 4076 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 3500 wrote to memory of 4076 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 4076 wrote to memory of 4568 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4076 wrote to memory of 4568 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 5112 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 5112 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe
PID 3500 wrote to memory of 1084 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 3500 wrote to memory of 1084 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 1084 wrote to memory of 3200 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 1084 wrote to memory of 3200 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 3500 wrote to memory of 652 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 3500 wrote to memory of 652 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 652 wrote to memory of 3940 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 652 wrote to memory of 3940 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 3500 wrote to memory of 4404 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 3500 wrote to memory of 4404 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 3500 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 3500 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 3500 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 3500 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe C:\Windows\system32\cmd.exe
PID 2780 wrote to memory of 4464 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2780 wrote to memory of 4464 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Epsilon.exe

"C:\Users\Admin\AppData\Local\Temp\Epsilon.exe"

C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe

C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic CsProduct Get UUID"

C:\Windows\System32\Wbem\WMIC.exe

wmic CsProduct Get UUID

C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe

"C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe" --type=gpu-process --field-trial-handle=1592,14741939536205931251,11946153141156301997,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\Epsilon" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 /prefetch:2

C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe

"C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1592,14741939536205931251,11946153141156301997,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Epsilon" --mojo-platform-channel-handle=1976 /prefetch:8

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM chrome.exe /F"

C:\Windows\system32\taskkill.exe

taskkill /IM chrome.exe /F

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4392 --field-trial-handle=2972,i,4036376905309803364,5412922217215781933,262144 --variations-seed-version /prefetch:8

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM msedge.exe /F"

C:\Windows\system32\taskkill.exe

taskkill /IM msedge.exe /F

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List"

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"

C:\Windows\System32\Wbem\WMIC.exe

wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_VideoController get name

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "cmd /c chcp 65001>nul && netsh wlan show profiles"

C:\Windows\system32\cmd.exe

cmd /c chcp 65001

C:\Windows\system32\chcp.com

chcp 65001

C:\Windows\system32\netsh.exe

netsh wlan show profiles

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsBootManager /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsBootManager.exe /f"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsBootManager /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsBootManager.exe /f

C:\Windows\system32\tasklist.exe

tasklist

C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe

"C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\Epsilon.exe" --type=gpu-process --field-trial-handle=1592,14741939536205931251,11946153141156301997,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Epsilon" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAIAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1272 /prefetch:2

Network

Country Destination Domain Proto
US 138.91.171.81:80 tcp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
DE 142.250.185.138:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 pki.goog udp
US 8.8.8.8:53 pki.goog udp
US 216.239.32.29:80 pki.goog tcp
US 8.8.8.8:53 138.185.250.142.in-addr.arpa udp
US 8.8.8.8:53 29.32.239.216.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.186.192:443 ipinfo.io tcp
US 8.8.8.8:53 192.186.117.34.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 dns.google udp
US 8.8.4.4:443 dns.google tcp
US 8.8.4.4:443 dns.google tcp
US 8.8.4.4:443 dns.google tcp
US 8.8.4.4:443 dns.google tcp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.4.4:443 dns.google tcp
US 8.8.4.4:443 dns.google tcp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 119.176.67.172.in-addr.arpa udp
N/A 127.0.0.1:80 tcp
US 8.8.4.4:443 dns.google tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 54.40.21.104.in-addr.arpa udp
US 8.8.8.8:53 15.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp

Files

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\System.dll

MD5 0d7ad4f45dc6f5aa87f606d0331c6901
SHA1 48df0911f0484cbe2a8cdd5362140b63c41ee457
SHA256 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512 c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\nsis7z.dll

MD5 80e44ce4895304c6a3a831310fbf8cd0
SHA1 36bd49ae21c460be5753a904b4501f1abca53508
SHA256 b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512 c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

C:\Users\Admin\AppData\Local\Temp\2enGxzXJpfeHS7VDp4GKdsVt97Z\chrome_100_percent.pak

MD5 4f7cf265db503b21845d2df4dc903022
SHA1 970b35882db6670c81bd745bdeed11f011c609da
SHA256 c48e6d360aee16159d4be43f9144f77d3275a87b3f77eae548e357601c55fc16
SHA512 5645d2c226697c7ac69ce73e9124630696516fc18286a5579823588f93a936da71084a3850f1f9a7b34c624f4c502957107f5957ffba5e6c1e4da6d8da7d3348

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\chrome_200_percent.pak

MD5 6a7a9dee6b4d47317b4478dba3b2076c
SHA1 e9167673a3d25ad37e2d83e04af92bfda48f0c86
SHA256 b820d19a7a8ce9d12a26837f967f983e45b07550b49e7b9a25e57b417c5f6fd9
SHA512 67466e21a13ca449b014b511fb49bfc51df841eb5776f93b4bda2e0023da96d368ac5c65de051ed9de1899275b9f33839af2c387be903688cdb48bf08993791e

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\d3dcompiler_47.dll

MD5 7641e39b7da4077084d2afe7c31032e0
SHA1 2256644f69435ff2fee76deb04d918083960d1eb
SHA256 44422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47
SHA512 8010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\Epsilon.exe

MD5 d8d4d2a04388a4b52f0c5ec2da7a0e72
SHA1 8553a159e9cdf5a5dbad04dd2fe954fcc2fc559b
SHA256 7ee7a631b7d502a7c0058cfa8e51f2773894e7fbfb822fe3807688834499937b
SHA512 e3dbd5598119bd9daf526a8214a996519a7d99287111e28027da81ef93904f5e2222b9510a8d6ff3d6da38702a8c5011c5ba19adfe26723ef6168a5706f0bd09

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\ffmpeg.dll

MD5 7977f3720aa86e0ec2ad2de44ad42004
SHA1 04a4ef5ccd72aa5d050cc606a7597a3b388c6400
SHA256 61c6bd5fee2c150265241a15379c4053b174b1cd7687749629afcdbd1264a02e
SHA512 8ef3b8f506b5ad7241b96d381a501033266358fb3756a457c46ed499547db1232012f849838e65f916129fab1a0d74711e9851b8e0669831acbbf4c3494e492d

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\icudtl.dat

MD5 2e7d2f6c3eed51f5eca878a466a1ab4e
SHA1 759bd98d218d7e392819107fab2a8fd1cfc63ddf
SHA256 b62b7240837172959299dc3be44fffa83dc374353154eca1612e1bde330aa8fa
SHA512 0f1465e8efe32b0eaba628a30bbb21254a05d80f4407a1434120a55fb928cf575b3879e1b7cf754cd19b23c262ae715fa84a8049073563cb38f1855be7db1124

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\libEGL.dll

MD5 7b77074945dfe5cf0b1c5a3748058d57
SHA1 fdea507ac2be491b8ad24ddc1030ea9980c94c0d
SHA256 994972c1bc515c199552d50e97ad217ae15a3eed16db06181c7df50e743e8a56
SHA512 d637b2c7d75723601af099317a39820d3edbd3cea1e1cb20b702deb6ca7fdb0b67e1351cc8fee1c7badff957fffb848a8dce18bb25bfd60c81a588da4f68c1fd

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\libGLESv2.dll

MD5 8c93e19281992a00993fc0f09e272917
SHA1 3a2d12bc85f829775ec8c5c1f8e35a783d37b7a7
SHA256 1ebc1da8d7e463a5d3dc127a632989ef35cfbd94cb18bf1f8ee790f172d43703
SHA512 c4ec65378d83e6645c9128825853de2d3e82c0f430cd28fdc761eaf2d011267c3794b7c1dcef017750323873d7fe976656eebf9ed7c03582741d43738f3e0c7c

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\LICENSE.electron.txt

MD5 4d42118d35941e0f664dddbd83f633c5
SHA1 2b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA256 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA512 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\LICENSES.chromium.html

MD5 4247afa6679602da138e41886bcf27da
SHA1 3bb8c83dc9d5592119675e67595b294211ddbf6e
SHA256 bf59a74b4404aa0c893ca8bbe636498629b6a3acdff4acb84de692462fd626e4
SHA512 ad3103f7fd32f0ec652bc7fcb8c303796367292a366037acad8e1312775cdd92c2f36ed8c34a809251ad044508e1e7579b79847de61025baf8bda5ad578a0330

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\vk_swiftshader.dll

MD5 77f7b4f46cb3e06b53729fd1e562dfef
SHA1 223c09805220ff2b5c1dcbdd5c0396231ea34f11
SHA256 a648cd4671b12b469c4d2de20c2ba2429c9388c0f9d4b3d9d2244853d0e5acb5
SHA512 6be9afda9320074c5842419cf8493d715ca65a3362d368d3a35e35a47d36f8197b0f19877485b41a06e21148613a77bb6275b0586c4a38da8a25efe6b5a6b571

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\v8_context_snapshot.bin

MD5 a718c9b6e5e6563e23e450a0d01b932a
SHA1 95ccb1228f024f037259e759dbac464f3c27b8cf
SHA256 315f5ed966a1f3a89c94d1b78b9bf70e59a2869601cf6551b2c1fd3e3b008447
SHA512 b04512e95ab3997bc7d5c65e2f526e124bf1895b139eb2b6c6c7b4a4aa381cd408eb2bba01f44b09b1936d24752baae288f24a32ed84687d3e7e0681b5387d01

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\snapshot_blob.bin

MD5 c497639990ef3d4435fd721e8e855c9a
SHA1 85e7df364daab70730c756b8e24e81965d5a2255
SHA256 5e15a82831965e521bee172e6878806bba51d410d1fdf1b4eb01385d1954502b
SHA512 63f2514d585dd7d3b988f0aaeed8106a06b67629eb54f2152e8b4a24276d9f56fc4650c8770d0ab44b4c57ca458856a0cce5f26f6226a56a807b38ce5615ead3

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\resources.pak

MD5 99c5bf0dcd43f961aa3e177f7dc42d42
SHA1 5618abd2e7b45c50400bb4aa0c455bb0b28bc472
SHA256 75ff04d991c2a203105525a1ccb200a461717ce7b86ada4be092fe903d95cdc8
SHA512 2e508c46eb266301f42ee6a7d63494f3856b422df61d0b605096bf4fc4943239d3fba15161adf8cb1cdcfd3bea8608102a0abce636999cc2a9e01bda51cc77ae

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\vulkan-1.dll

MD5 25afbdf6701013c57b19b92225920915
SHA1 009300dd4ab3b81794388ce7d126ae90ff97535f
SHA256 22bb65dd206ce7ee10c05557933a04a04144e1a8228d2a9d1e9d704b0b1b2f7c
SHA512 575e38b60948cb704c355ba9cf3457f2693c30f95e85f10f795e759652bf4317e18ba480bee8aafcea9108415e8e58f674b22c7513a9fabee765142486919a0e

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\vk_swiftshader_icd.json

MD5 8642dd3a87e2de6e991fae08458e302b
SHA1 9c06735c31cec00600fd763a92f8112d085bd12a
SHA256 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512 f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\da.pak

MD5 22134b12d90fdc00f23a1e0a6fb04eec
SHA1 17c9fc2cacb6e5ccc393d1af9bdf3e8e63ecdaaa
SHA256 62020dd01b47b696e2e11d7f5598628c07782a96ea6bc013dc2ffe8c820b7c94
SHA512 9cce6ffb2d84cedcc5ccf200080d6a2cab691468c042e8e48a5fdd809b5c0d067c322326e49d18f66da8e0b1d28adeda4cd03e12d7aa11350b72776737aa3427

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\es.pak

MD5 39288ea031009bb9db582cbd93c7d534
SHA1 467f76d33e39526a4d8cb6068eaf8e2791b3a9ee
SHA256 6cd39669df96b4b5b9047f7689338d3beb9ad7f8be2fddc595ef1ecbc47481c2
SHA512 4a635e969cf2b09aab5f8723a3380c5e226bf0546019506d18de65c1e4a599d268b9ee2e03a65b245075f899a09697b7b535f1055c19344a411100c8f29d93b2

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\es-419.pak

MD5 cadd9ec43e823609c4bbdc418da6009a
SHA1 91bdd44d5972a4763227ee7c127fe122aefe195f
SHA256 6c8d074047d57a79cf5cadf9caa6e9a64bce0895743a3dd89ed1350cc91c1e4c
SHA512 2b9eae4072e46024e33f000b1df1a64246f70498a557f4a03234d3dd47aadb04883b98ebf48eec21f0d6ca4c8a62065f675fdb352be680a56644ea3ae1db93a5

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\et.pak

MD5 fcdea2954549e5d8f1e7a5de36ae4f74
SHA1 41dcdcefbbab3e0e908d98ec9b6bac7eacecbb99
SHA256 d875bca2e8800657306727902f4f5fceec7415ea530bfa780ece0f016f792569
SHA512 37ea008078083a36b07b1f5d0ca6e16f62b06a19266d8042efc796bf33c53200f37d3a37f5b48d024dbfab9e6689ec9c3f22d6e37e3898fa7deb61ace1fb2df3

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\lv.pak

MD5 7313fab584b7561b1fa63de07b972118
SHA1 3a44d445f57a78867d37638a80ab39add3fcaa4a
SHA256 7b92238240c31c197029d41fdffc244f68caeb8002854f65ee3125bd95643598
SHA512 05b067847a63c0419298616278678ade6a4fec4008323121ace5a09e22f6dae409494474f5a88adc703833691a7d4810546d012d4311e176fe58812f166b8ae3

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\lt.pak

MD5 02e9c88d9d5e58d135c9a92effcce38d
SHA1 92421a5fac68d506fa904075ea7cf39a3da8efc3
SHA256 38ad40532287da53fcdb6076b9cdb841bbb4f30162681707295bcab448149e65
SHA512 f0897d62e81eb6e2c56cf1a5b5ad5124521c345f70cab841071c7b70b16130984700d694a32dfa010460244d8b520ba1b217ffd76f75c074b5b3a9ccda26b02b

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\ko.pak

MD5 f21c6033fa73bc7d3358c2467c9048d2
SHA1 939f209f00e6664294872e0dc3b33a9015a2f1fb
SHA256 d19cfa8ae07f23b81c0d40d7e751628844fc1aafb83d4bb4dcbe71caecf6ea2e
SHA512 a4a4909ca56d3d924639cf1adab6d9ee512132c99c8e3dd37f2b949a1c816ab29ce81c01c658022e680344516201fdb0440abb97e577e6946e2731411674566d

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\kn.pak

MD5 90107e2353e707a6d071c9aabb5adefa
SHA1 e4dfe445ca7830b3a56af38af1d73e3cb94abc73
SHA256 9155b06ccaefbea6461f5c51e25ce25d85ca7bd557e76dae00a4d6a09a4bc424
SHA512 dead3b94638afbf4ef27e1cb5283ad2d0af73ab8996e7d2e8202ad174796121799992f577c974fc0ec53fe2b8f6fb4d37c3bef70b72c29b5b721377a0cf3b093

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\ja.pak

MD5 e720738027460b044429705f7ea1d25c
SHA1 851b59efad4ae074849fe41f40a56c5534caaf72
SHA256 c78fde77efbca1b3cc0cd12bda718d1a113bf6b6f3ed558b5c9a452dc974edfa
SHA512 08b0fd0ceff7ddfed26985bf84b54d75cead1f6fd4d5971da9e40996af6dc5fe9455c402f62e758020a6ccdb1ee0213cc2a5ddfa28a2bfb1e8064c6a4401c3a2

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\it.pak

MD5 a2b9cce245e754258ea187ceb3aa2670
SHA1 50f84fbcabea10385714a3c3a2483247ac040c02
SHA256 b72f89e5d2cacbd2db7ce28ceae35faab8c4199ec993fea64e8c78df882032d0
SHA512 5e9cca2605d4a86d4f2b39845c8396c37f88b6f1d08c8f0e2b6f0896d60754331a588d0c0fc59e9ad8fccf0d50100a2307fff2d9df784f91537b1d9e108727ad

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\id.pak

MD5 b5e4e0092bd1063e8bd68d0b539ab005
SHA1 5e3d12a6fb497687df81ed64de17b0502ea84f2a
SHA256 8d7ef1377d39fb6045c9d4b1bb064c329bd789ee33b6de530c187f1e713dd7f0
SHA512 52b535a143bc13a03804cfda2d3f2f81f036b8d24897d1ef4a657ed290ba14e43d7cfe92c868cdef6b093b09b90119f7e50e8496eaf347c8e4fdfc13c5e306a2

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\hu.pak

MD5 ae13d7ddfeb82df9950c71a4ea0bd10f
SHA1 7b55315628060668f444b110031b1fc4715bda11
SHA256 17758e2bc746f6d770fca8969ed0aa2d00658d68792d2e8bae94d7b58665d83f
SHA512 f94247fecc4fda5bdbe9732f151cdffed337eee01f59aaab6e6452c570a549dfb87c0528484c1879a04af134ac883a21043c582d0a642e185e4e64e3aff830be

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\hr.pak

MD5 feea1754a955eb61cd41763be4e5ae2e
SHA1 bb6252fec9ada8bf9ed7b81f59843d5abfcac80d
SHA256 787680ecb5d5ece246894481834b30145919c22b04d2dcad2f6ea2b2254abafb
SHA512 3d24c9ccb83f6ecf976df5cf00fdb0b46d53f09c1cb08ab68bb8d9944452785f40a761a152605708d7672f7dcb24e0b7cad1cfc14b267bf5fc1393cfd05ae4d0

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\hi.pak

MD5 34bcb12c154075510d9d3066ad4a8d1f
SHA1 6a3c062221db4f391f8505892f584647b05a410a
SHA256 83c6c411d75ec5c5de6984b21fdecb07c9b926c66b67c5c99380605f6fdd8928
SHA512 aba38e4a8039bbdc46b510a8370c82d3b199b4a02da7751c162c941e6d893a9cdfc0ce92db4144ecc2b2644d58b0bc6cc7cceb0533c62c131cc55be0258c3a7f

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\he.pak

MD5 6010987755f300c7984dd3f72f518ab2
SHA1 eb85f0849a86aa5fb585efaa070d2d7300b197a3
SHA256 1c84a575e28e9a72335ed13409d6861995bd9859fd57a4d9509fe912db4a56a9
SHA512 4b77f74d986c16524a3a6c7f60cdbe53ac5be59418737835a7fa186e4b6ee853cce8317cce352fe4064c75a7d27bf1303d76eabc53993ff1e4b7758a8ccc6228

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\gu.pak

MD5 57cf11b4352e59f11b20b7ab754af031
SHA1 ca1716d419f175a2dd548929fd551dcbd1ef4bd7
SHA256 55588f211c26e1deb47b04d39728ec051b99334c55d30252b94df57d0fba2f52
SHA512 c74360769323b3267aa218e994f49c7e135d4f320365a349a5362c1755c4b660050a070bec6c5446d4620be97a341270b6c01289db20ddf5199ece23117110a4

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\fr.pak

MD5 e609419893f1d885a2f17f94805a441c
SHA1 31083ac114fa4077a7da7c796ab3744873fb893f
SHA256 8d71c36d04f2d6062458aa2614f7ce223b2ee9b4665556803f764f384b191091
SHA512 77f965f436a009a5aacebed3cc15adde5a1054e1c699b8a50b947a7e78a97cf43317d50b0ab7a42532c77d320b7393007e47199f31c58f7acb6f462f98fdd4c4

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\fil.pak

MD5 693abd21a6855aeaa31f6c738c6b6fc9
SHA1 bb1fa375a9f0c682d9913b1c1610535eb2b4028d
SHA256 f0bb231c710c025ad4643e2128867de6e111da867384082e7dc2d0769976b6ce
SHA512 03c68c45e3144a73251d950a8c7695e5b9c2c66711134016543ac07ee6eded723324d5312fad4624d35d0bfe9861ca4b7440d2445e6d3d6cff4a1a3cd5263c98

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\fi.pak

MD5 4f323a2eb73ccd029e742cee4dfa9769
SHA1 b860372d21cc55eb7ddbbf9f5bac61fed39426de
SHA256 e1888472c8e1330e70e514d0a1936749a7e5d39f67e7edc818661c2cbf3e301a
SHA512 d07d0f74736cd32d73b3a33867e65a25b727b5c30cb743162908e23d958fb3ae97285f600a9ef8196e61be9d450da5903d1e468fceb3b05ced93aa600387fddb

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\mr.pak

MD5 fd3452d812a6129b8b6db620423adca0
SHA1 9bfe47a0e9f1843c90875f28d8873d592098024c
SHA256 c9704a3e528092ef676be4a653cb14b906e7c32424d59c8e4f22981014bd9111
SHA512 7ec30343e985f7bdc6a64fc13d50bfe58ae098b03e18afeaeb4c89073059698cdf40477f2323a52c5e8f07f37b28608c54734501d14ad6ae0c9a0f2f4ab0e689

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\ml.pak

MD5 21aee42070f9eace2a8e14759526f05f
SHA1 fedd83251a3fdb1846bf0e7e49a3a78cd77fae02
SHA256 393d2dcd5c7c33945626fcf10ea4457649fa7b4c100c039898385133c26395cc
SHA512 60cc85a5a638d370710680bd39a6946d04660a0856bde49190fbc0002acf91617cfc3f3087a37cf592c047550ed2c5b73c2a769fbdffcacf4ad3ffa129c929e3

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\pt-BR.pak

MD5 3b70cbf1aa47436b78a5e8c7672ce775
SHA1 ff9f2820e5782f9eae0ea1d5ede61665fa62cc06
SHA256 8b4a8a3b8741610c279283a6cb843cb274223f720edac1c73296340b02569fbe
SHA512 41e3b3264d8034edf9ee1ab696ca4612ee6ef4e8537b4598805362c4a250f81274425cfa2c9c62330fed73a683e6d3b2ff537b51d869d7da19c4422728da7c0a

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\pl.pak

MD5 41fd7c76e30b333027e86e20a65283a8
SHA1 81afebdfd62255d0b0ca508141dcd7b67982f4c1
SHA256 5de95dc2236f896e66debfe2cc7553a5bfeaa7ffea2820fe1f2f67368af84f7e
SHA512 c59132dc329ee72fa8e9e9c653da597b5fa40a6eb0a7988cf62b1bdaa646a9f09f504219bfbc5af394a12c9ab6050a39740460a3e5c3ed0946b556c33f608219

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\nl.pak

MD5 a17bff141aec095625d0420c7a609b08
SHA1 edf3746b20ff9e3bdbf09b195e7781da1f799a91
SHA256 7482c28c2a42a94615118b6b8cc7d002415923ca104ef86a95a4ad05c8db36b9
SHA512 903c50c39160e40920bdcce0dc337e83b03bba00481f82ebc8ac1cf6927ebfaa75b1f9791038a71632c5e79bf7331bbf7468cc626e303929801c08f54d092c8b

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\nb.pak

MD5 e5546ac3407546d6b786e24c7bc21ab1
SHA1 7a9e44a525ae005d0b41020c403c4e1e49d237b7
SHA256 751521cbf27777bc99f2039b987686f921cb27e02c959f6cbeb976799e45066e
SHA512 becf51540db5a0893e6f44d588be98142bab5c2a0f37c0212348e3cf39da52def2fd104c039229b52767a9345890f5768ed897b4bde5c6feccd75036d8b4f363

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\ms.pak

MD5 0bb952597b170dd4dd76e9d9d546ac3d
SHA1 101aafdf6a4ac0cdba7bd88538e7ac395e715e3e
SHA256 f6721ce0d4d601ffeff011d652a9bf2518386cd8c1d2317763e37512451534ff
SHA512 46c9b63273d6ea30ee63ff230d6b5600018ae54032e04a6707f5873ebd383d0d59645f8d0b44b8ce9a4d40d5acd3453b618b9c4fd3c1b958adb5aefba3465464

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\fa.pak

MD5 e3f56d4b0fa2878ed6847631d3b05dea
SHA1 627f48d5423afcb3cade0789f058d60867419041
SHA256 2ee67a38cce9ffae1a639be17c0ef7ed7c763d9c15c9621f300bf634e1f25a64
SHA512 e29c28717f31dc57c2294857680a439acec25478913ea425b0c7b6e50f3343b21fb7983c15352f9e3c001ffa0c8e500d92a1924acde32a4b5bf3f5b6c60c4142

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\en-US.pak

MD5 0dcd84e9e50a3e0819d5875ea889ced4
SHA1 7c47f6e4e0cafec3a13c07d689d1dd6ff6516b1e
SHA256 699b6d7f05a484e76d3e1197a656247863e570f03cc02634c9dc42078a5c5007
SHA512 153fc15f676d78d5d0f3a6862fc7eaa60c2a659c25ce87485f0253c321d9407a9b799b959104c27a8e7b5487f0de926ae8f375e2c3d313329112e48f2d001a17

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\en-GB.pak

MD5 074d3dd44706502de7c33e791794b23a
SHA1 564a73ffad9232052c692eb94f560d6b17227c47
SHA256 9c3954a5ca2cf126370a1152e9281f41a7ca97c69293f556a2c79ea6729324ae
SHA512 6e1296d04b16534274fa438643ecee6e37d17ed935623f73d5a8f3510a194e0efda9ca60fac8d51d25763c4818050e23c306f9ee18284b8600610d14f7768d98

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\el.pak

MD5 db449f218a705453eb10b5f418e28d7b
SHA1 7bc8fcc59c532bb086a7f081cd8d275a89dac835
SHA256 73da35d01b91707846775bea7dc0331fc1caebd5c63d101aa8bb8bb58ca7f193
SHA512 7dce45bc723d62498b335be0ab72dfc91c44c01f96f25c2314e9245a0eab28a92dcaa730b11f108b604545592445ed1612721416f60ae3bf55b1bd438bd04f78

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\de.pak

MD5 fceb00caf7e76e688007665feae99e83
SHA1 06fece84cf7028b3871f144258b8d084faf8745b
SHA256 80e63ef1950b8438813271365a7b6a3f3aba0bacc179f5675654249f31c06a3c
SHA512 08c14eb299a035949e6b64a069cadee66c420b7d66bb00d65d6a1a08fbee08a57ab08f8e77c44387f0fe02b47aeb0bf2709a1979025613cb51af4ab82fc3b6d5

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\pt-PT.pak

MD5 e9f8bc9fd1e845551fe3bb63c9149726
SHA1 0bfbe46e8ffd62493c019e890a30ebc666838796
SHA256 50cadb4da4e61fc335d145374511c34e5a0e40f9c26363614cd907cc7942a777
SHA512 1d3761caadc3ac750c0a89c64db472bcb0764fc1c4b1108a9443fa71633ec7fdd945120a6f05e76221d9c58103cc9865b4857877d57d60b623f92a0235ed15fb

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\cs.pak

MD5 f125738776a9fb8dbf25311fa3dadbcf
SHA1 3448b58d4810e69f5c1eca4e1484308c3ceff502
SHA256 5d5089718677f9a4e677dec72058c376a5829921cd523ecb919d0da7766d3cd4
SHA512 ca5300e5fb73ed4ee8c108e875c66ce7f105693f3ba78cb00f33218febfdb3ea27fe26f118dff3fb2e4af66f722f8348760cb576aba48887be25fdfae4991776

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\ca.pak

MD5 53e3fb38f84f60b98d23b337e4f03f92
SHA1 42e435837dd36872d2a413518a299cd293ff8536
SHA256 b00bd41c1222b3ea078df5b92cec1946e41430be241d0d57dc9baa4c70c91f3a
SHA512 98d0328e7370b1fec9e15ad0cff9e1353686fc581e3df9a8896e3c2e62ced044c4c51ea63f35ec8b7eb3e7df5c83ef5157468979b7f20e85480597042c1ac192

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\bn.pak

MD5 ee25e9cf28fdd35846d8a9b3c4220eed
SHA1 702342cc207ced1bb585195abcf263cbc4ea0069
SHA256 9994b9832bce803bee8c48a8176653099df7768074e3c54d09a18593376466b9
SHA512 2b703cd07bacc9f70e36844f148c980cb112a806b4ca11f692b9bbe6995fd5636eb9bdc84c5cfaf79790dbbb1ecf7cf2b61a7d6ff89311eb4907c586e20b7dbd

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\bg.pak

MD5 5ed6adc6158f554e71bdac7dc9731b16
SHA1 394c8396c566d2b92cef881c332624be812115fa
SHA256 0a3e79a6d270d212037ccb5a8730b7abfc45c6e9175dd7e17d997daed0985726
SHA512 796f107698e82dfad9ec8d2ac1fc3f79b1f3a339a06eccd783dcd262ddb7399f8e3c093799f16640cf7a4488f1d2eb04ba6b7cb14ac9e9fcf87488cb8305b35d

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\ar.pak

MD5 3a8a7a08fedb148ebee6d3300356e37a
SHA1 2e9ac1ea8b6396b909f823486538d5640ddcaa1a
SHA256 43636fc76a2da6ab562c4c3bcc1a5d548a169dc0e884484fb7e4341814c44c78
SHA512 7951829cc7aa385bb5f8078a7af7d4f0b49fa8c05eecb2808eac3fb0e8700c63f92db888ad64f526d992a14d54948a6807bf06f9fb688aecea40311eaacea181

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\am.pak

MD5 ebe0e7e0c78fac281a3f0196da22cee9
SHA1 689864d898905d43b8a70bdf37c5b339daaf48eb
SHA256 08d86a45ff0a4b21e74b06509c376ab0f907cae72a3e0cbf5c17fc275d10ac5d
SHA512 89b6603e5db8ad53ee5623c2c0f7e81194278dbdf5ed49c7480049006b20744fd4642743c2b4a264cafa87e7f787d6d6cbf26f12ff2b851333b3ba7541ebd933

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\ro.pak

MD5 4d1ed9e347de9351454d11132c06e916
SHA1 e3734d17a579ac423ec5fdc5829a211c7b76e049
SHA256 57dc80c76c535c645893c9d3b4d0c4779aaa877445383abec79e32cf02c41276
SHA512 bd3d0841678879a24eb6f2f15c27bcb64a5d7ad171debbb51e7601a3898b830b1985b365363a01d22967969d4d4ddf89a130a5a33ff6a94cef6410b0e89f1849

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\sk.pak

MD5 befec33f564454253ad90d6cc06ecf62
SHA1 1fa0e082c89f9aa397551421a35b7dfc941f5250
SHA256 9db30eeac7f1814158283affa0af6451c6f7966896cd6d6df8eab14a37e58c9f
SHA512 a581faf67311eb8d81b481d1e3348f579745331f87523650a4fc35ddbe6d5033e726feab0ca3911ef76a21aceabc3e2122d16333d1b7840a933b5231a9e2d157

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\ru.pak

MD5 fd441a4b72397f5d76915ebcdef45aa1
SHA1 94a0ab5704e7303c6ef1c2ee5be0b6f4a52d146e
SHA256 df41fb92e4d682d47b5adf942600b4f23c1aa5274b31b844cd4c4b6f0ec86a86
SHA512 5fab517ec0141bb67b4b5ac868100b770fc0b7773b94f977af9205294da9305a2079327a4ece1ff1d9a3b3c805c8d8676c2b0505bf190d1c57c4ed0c14a1cfdb

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\sl.pak

MD5 cfb094955a5a8f655ce8a598d5a89706
SHA1 181ace68b0c3be132ab73302ba7f7c8750f9adae
SHA256 15489195e92cf11354a9a02895aad2ba8f17aecb676dd77942054a4f3f0fd623
SHA512 a31e131663072c1192a4146321db5f0f457d27e14afc8ae40a92a4f255df4cd5302774534fed5247e145c73739a709dd5852af35750f35ecbab0fd4c1a612e2f

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\sv.pak

MD5 773fc8c89b093c40191fc233730188c1
SHA1 28001794144bdb76f62044d57e2d52c8ae1635c6
SHA256 6aab29795a36a0234c6d447fb1fdd9011da505c348b934346a27b6a2ddb92ff3
SHA512 f9bfd3e72955104b922c34352ec16d56939eea634b9abd549d4a3342dd72f8768c85bff59814e419aee6469f6521f4f71fcfe9b8a81c1824187ba818f6d6caac

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\sr.pak

MD5 f4041623ce5e06d2dea58d532edb120a
SHA1 2d7ee3ef60b39e3508427c7bc12e046d7bf5e928
SHA256 f2f80d7325d259811afea1e7648c42d3ef3eebfeddaec27ee2817f4e68ab541b
SHA512 18691f4cee3eeaa2305d1c978d803fdf757d9c4e87e88e36d7b1fff482cfddd820568b39a1108065f61dd2cf10d7219c27813aad4d64e71695ab91084ec3c694

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\sw.pak

MD5 70510abd3079bf26caf327989e810216
SHA1 ea640cb8b3c63d71d9b3a0d377fef5540b04fe81
SHA256 a11017a3e0e7f48338d4515ec9e79c1764387232a0d9a05fecc4b594bff40091
SHA512 ecbc97397557e27e66536a97ddf78a744c104b258d40d6f31972e6e5c6615699dd24eb02144ae0d3d53764da0f83a06f561ba95bbf08da4bf4a548b0e7f8c052

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\tr.pak

MD5 4e7c047364c7c4809242741b98b28092
SHA1 4ff1b303476cb75d8190568c346e8cc2e452da14
SHA256 6a25be43b786ab853f8081c53012be623543830cce5ccd246ec040d98f22b852
SHA512 4624cec04114c15a72a804fa4966fe61303effe97039337273ed0dc99e8a6a685ca5cf5fa901a84c8b219d443f1a89e6e7cbe09eb21e7ecff662301067a6cefb

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\th.pak

MD5 96212a5191b7062d1620388acf1d09cd
SHA1 d3616b6c4649dcfa347df0473e64219ccd63e63a
SHA256 fa5f97bf433df481a6257fa39ef8dcc7961c5d5a83008b02c9773836d7bfc96c
SHA512 5192c36317c3a50696796c7286f77b1a02b7a0f83abb16ff7d47ec94281b85ee2fb29b9ddff7c4ad8b28a2a757772bd2bc726b10c19658ab672966679d391508

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\te.pak

MD5 93edec428bdaa1f84f5c9478f440997a
SHA1 e03f6bd50b0e0d888f9dfbdc87c98ff567e6a91a
SHA256 a499f50e452ca02ea476fab8954e7ff58d2ee0c6263b8a4657b6ebddeecd2520
SHA512 ae34e29f1e8d23dacca66036e355b12ebb1117ec6e5e99413c792a0dc8b772eb63578b2406730b014fb4ffe32b05dfd9fab8adcf38ab3f5b9bfd0cf054ed09f7

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\ta.pak

MD5 8a1a245b43af1f174f262d8f53014d59
SHA1 655045f5c71aa2589851a66d5387d4125bbce1ec
SHA256 85d8ef6fb5fdbd1d689aa6cdbbb768376b08b03ff39f7528a3804a3b4bd82af1
SHA512 d71b73fd2b5658acf5825f142130c49c278c801fd8beb5fb2039a3c209a1214a9cc00fb6896735fa4d020bc2279afca1577f35fb0a96a315631d46656d2055d3

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\zh-TW.pak

MD5 03ade5ba27cd3ae9bab6ab3a5cb721c2
SHA1 a747311a5f6c2e0e535efd52bc96f3c4d12d5c3f
SHA256 0c4abf7a66026068cd4f458d504cb04f3e04cf9fae45419ddc2d592f24899a2a
SHA512 33e122328773039595248a85dc0940841a1e273957ec9a4e175871b3ada48008b608ca6569b495275abb8e2a8844ee0c4d90b48af915a3f5a6aa44f3c37e51f3

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\zh-CN.pak

MD5 20b6d54de42cf9c56f0a85fdc27d82e8
SHA1 cecb82b4afe8544876f443fcf578453358ab59a8
SHA256 4140caf95939f116993ecd8bc5f7681991f96735d2397c9c7b4c66e3013eed24
SHA512 646af407dfb85863f4555961f37f706c18b5c1e68b3111eda9f9b531ba2bb60cf67211ad634037b872156f0ddd04d50d68c49173a27a78ce59f75cbc2bb6c3bf

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\vi.pak

MD5 98cb45f0555aee1985710196db17d72e
SHA1 1362238c253bc2a0e50c8dde6c95deb027fd6348
SHA256 39a130557fea33a9c899f347fa3ed455e58bd51acc0b3b4586f76694b0f34646
SHA512 93125310ade0c7029f0406aab291c35d2b7d1941f85bfd3d6071f85ff347c46e793a5ef164c08ebfcba252269a4aa84bf7a3b8779a36ee2f3da303411becc27d

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\locales\uk.pak

MD5 33f02db055c3f91148feee375acabfb7
SHA1 ca1dc284f41bc55cf35f94a4039008df9970d411
SHA256 1968e9ed7722089330e7a8ae2c08f241aa106ed2be8948461439e6a92c330688
SHA512 ad16973e4103ced979276c6de175eb600241491ec9c441168e6375f68f8867d3f0eba422dd0ef6404208564015119f1e5e2500d5cf4ff2d8da45d713ed8c251d

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\resources\app.asar

MD5 b4d1f5356192c229d8f811edeca2fc29
SHA1 2e24b7e3c8d7c666382eeed92cfd793958a6b1f1
SHA256 8a2f4ca3f653a6a570e8ba089ebe3dc57f156430d957ec76bbf36d469c9271ae
SHA512 061130d80833019b34332c7239363b6960eb0bdadaaadcea3061dbef562c156fb2fb2bc9f2aefe41c01c03896d0b5449cd3d0f87ba2c9143ca44c45061eff122

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\resources\elevate.exe

MD5 792b92c8ad13c46f27c7ced0810694df
SHA1 d8d449b92de20a57df722df46435ba4553ecc802
SHA256 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37
SHA512 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\app.manifest

MD5 8951565428aa6644f1505edb592ab38f
SHA1 9c4bee78e7338f4f8b2c8b6c0e187f43cfe88bf2
SHA256 8814db9e125d0c2b7489f8c7c3e95adf41f992d4397ed718bda8573cb8fb0e83
SHA512 7577bad37b67bf13a0d7f9b8b7d6c077ecdfb81a5bee94e06dc99e84cb20db2d568f74d1bb2cef906470b4f6859e00214beacca7d82e2b99126d27820bf3b8f5

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\screenCapture_1.3.2.bat

MD5 da0f40d84d72ae3e9324ad9a040a2e58
SHA1 4ca7f6f90fb67dce8470b67010aa19aa0fd6253f
SHA256 818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b
SHA512 30b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\index.js

MD5 d226502c9bf2ae0a7f029bd7930be88e
SHA1 6be773fb30c7693b338f7c911b253e4f430c2f9b
SHA256 77a3965315946a325ddcf0709d927ba72aa47f889976cbccf567c76cc545159f
SHA512 93f3d885dad1540b1f721894209cb7f164f0f6f92857d713438e0ce685fc5ee1fc94eb27296462cdeede49b30af8bf089a1fc2a34f8577479645d556aaac2f8e

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\swiftshader\libGLESv2.dll

MD5 1e401ccda5b723ab8a595a54f7d2531c
SHA1 127716680dd16f776b19c2306d716935e54c5100
SHA256 c167a458174e2a280c39d7af31bd109e8e2921032a687097b584653adc33ab21
SHA512 1f2f35021f338aa7c5a0ae83c196217fbca6b1d017ac1bb4f1eebb93bd6e18c5d74c1a14bd4899d7a91d054b0139b2c4fc3271c35148ad1d8b71139aff0132fc

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\7z-out\swiftshader\libEGL.dll

MD5 be1b6fe26a1b5a3e1302c26ce5ce53f3
SHA1 c3cac08e89c4cc91eae1cc87e33a1dea723f1d78
SHA256 162abe61314e720384d8cdd43190a89df8a96de52f3ede7b6c58998f615d8546
SHA512 07dca111391dfb6b7e90d4be02071bc625128eeca0b9d9a3cebdc7916baec9f95cbbf906f2533befd6b62b9bbc69488ffa720f8d40c9710dd3b7d540d9dcaa55

C:\Users\Admin\AppData\Local\Temp\nsv7AEE.tmp\StdUtils.dll

MD5 c6a6e03f77c313b267498515488c5740
SHA1 3d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256 b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA512 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

C:\Users\Admin\AppData\Local\Temp\0646ac87-cd61-4f63-aeac-7cd4c4040b73.tmp.node

MD5 1fbfbd5cbf751ea97427cae6f1e89136
SHA1 451926bcb5e20b394e459cc0a7536cf5330afc89
SHA256 19ddd46af98688dd860c2582cea43d990ec63fc5c495c96a1286e8e1095185c1
SHA512 dbfd25abe8d357ddca95541057ee9794f9c475177a9cde9b204494800faec657f9c75fc3e7054e28edbb4e0514eed549f83a32821cb62348f3f81adb95cca583

memory/1976-568-0x00007FF932D30000-0x00007FF932D31000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3b018535-35da-4ca0-8c7e-0579c916e99c.tmp.node

MD5 d4e6004197508892d18fc47645b25f62
SHA1 1afceda2531e593c00de7ab994f928a150de5b4d
SHA256 dc29d32decbd161ea4ff1e645d3fdf7a1ce3db0ee25e5485bc19fc775922b71c
SHA512 0be017eaba3764eb9f38e78248528a9e025958e713a8eb4a8f9b03d087267e107ceef8525a4ecfcbb684b077145fb0161e5dbe05f9fd95f8f94a140fe3ceb8a4

C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Credit Cards\All Credit Cards.txt

MD5 dec2be4f1ec3592cea668aa279e7cc9b
SHA1 327cf8ab0c895e10674e00ea7f437784bb11d718
SHA256 753b99d2b4e8c58bfd10995d0c2c19255fe9c8f53703bb27d1b6f76f1f4e83cc
SHA512 81728e3d31b72905b3a09c79d1e307c4e8e79d436fcfe7560a8046b46ca4ae994fdfaeb1bc2328e35f418b8128f2e7239289e84350e142146df9cde86b20bb66

C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\AutoFill Data\All Autofill Data.txt

MD5 810ae82f863a5ffae14d3b3944252a4e
SHA1 5393e27113753191436b14f0cafa8acabcfe6b2a
SHA256 453478914b72d9056472fb1e44c69606c62331452f47a1f3c02190f26501785c
SHA512 2421a397dd2ebb17947167addacd3117f666ddab388e3678168075f58dc8eee15bb49a4aac2290140ae5102924852d27b538740a859d0b35245f505b20f29112

memory/4112-649-0x0000024DCEF70000-0x0000024DCEF71000-memory.dmp

memory/4112-648-0x0000024DCEF70000-0x0000024DCEF71000-memory.dmp

memory/4112-647-0x0000024DCEF70000-0x0000024DCEF71000-memory.dmp

memory/4112-653-0x0000024DCEF70000-0x0000024DCEF71000-memory.dmp

memory/4112-654-0x0000024DCEF70000-0x0000024DCEF71000-memory.dmp

memory/4112-655-0x0000024DCEF70000-0x0000024DCEF71000-memory.dmp

memory/4112-656-0x0000024DCEF70000-0x0000024DCEF71000-memory.dmp

memory/4112-658-0x0000024DCEF70000-0x0000024DCEF71000-memory.dmp

memory/4112-659-0x0000024DCEF70000-0x0000024DCEF71000-memory.dmp

memory/4112-657-0x0000024DCEF70000-0x0000024DCEF71000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:54

Platform

win10v2004-20231215-en

Max time kernel

443s

Max time network

1162s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3736 wrote to memory of 1996 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3736 wrote to memory of 1996 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 3736 wrote to memory of 1996 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1996 -ip 1996

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 612

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 3.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral12

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:56

Platform

win10v2004-20240226-en

Max time kernel

449s

Max time network

1172s

Command Line

"C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe

"C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
GB 23.44.234.16:80 tcp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 121.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 18.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:55

Platform

win10v2004-20240226-en

Max time kernel

1681s

Max time network

1696s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeManageVolumePrivilege N/A C:\Windows\System32\svchost.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 992 wrote to memory of 5084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 5084 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 3892 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 992 wrote to memory of 2004 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9713546f8,0x7ff971354708,0x7ff971354718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,10451505047146773072,12969873898509005702,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3968 /prefetch:2

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k UnistackSvcGroup

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 99.242.123.52.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 13.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 154.173.246.72.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 235.14.97.104.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 9f44d6f922f830d04d7463189045a5a3
SHA1 2e9ae7188ab8f88078e83ba7f42a11a2c421cb1c
SHA256 0ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a
SHA512 7c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d

\??\pipe\LOCAL\crashpad_992_WEUCLATICFVMVDUW

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 7740a919423ddc469647f8fdd981324d
SHA1 c1bc3f834507e4940a0b7594e34c4b83bbea7cda
SHA256 bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221
SHA512 7ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 5975638efce7af8f0744f4fdce0cc1a8
SHA1 854e9d81c415ef5321939f85b71391d86f9c7a50
SHA256 9c045f0248efca6eb64e8399c9d702095469d81b398a41e56d7929a6084053f2
SHA512 f9b0c03990a288d2a3ed570dd19e71f33f69d6d62d76bed323dd25c813b7f15b55d402abddb74f70e7a721c94b59bc456745862b580432cd632b3ef175ef9280

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 318132c07a0a82c93c6773e851cd55c7
SHA1 4b6b74fa78e6feadece89eb1c08acf85c75f3fc7
SHA256 b07bbbfb8c77f6d127af53c0ce98822eb1bcb5366e85be0022b3ae6e352b12f1
SHA512 00ed086369fc6fa710766a3c78bd1f69acb5346d412162da9987a2b7caae9675ee7cc927a982b78aa2965869a66a3331a2887b028cbda0edaf26c28acf8415d7

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 0a7464a9d819c94ec5064c6edb8851be
SHA1 81b5cbb364765df9c90613e77f5c5f330e6339be
SHA256 308769350fd127ae8cfd5697002aca6fdecfca1087a5d84483f7560aefa0314d
SHA512 da0fd4fec7e1dc261b84e1a23ec64e2822dcf8865e28f5955332d73b4f195adb4a48a1446c1ca1d0a12925404c6389bbacc04d30c8e51d4affd16221ddf0bef5

memory/3268-112-0x000001C085A40000-0x000001C085A50000-memory.dmp

memory/3268-128-0x000001C085B40000-0x000001C085B50000-memory.dmp

memory/3268-144-0x000001C08DEB0000-0x000001C08DEB1000-memory.dmp

memory/3268-146-0x000001C08DEE0000-0x000001C08DEE1000-memory.dmp

memory/3268-147-0x000001C08DEE0000-0x000001C08DEE1000-memory.dmp

memory/3268-148-0x000001C08DFF0000-0x000001C08DFF1000-memory.dmp

Analysis: behavioral7

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:56

Platform

win10v2004-20240226-en

Max time kernel

1788s

Max time network

1820s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffmpeg.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffmpeg.dll,#1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3996 --field-trial-handle=2240,i,16875000905773190493,11379096115878622792,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4928 --field-trial-handle=2240,i,16875000905773190493,11379096115878622792,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
GB 216.58.212.202:443 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 98.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 91.16.208.104.in-addr.arpa udp

Files

N/A

Analysis: behavioral8

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:56

Platform

win10v2004-20240226-en

Max time kernel

444s

Max time network

1175s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libEGL.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libEGL.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 121.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 88.65.42.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral13

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:57

Platform

win10v2004-20240226-en

Max time kernel

1165s

Max time network

1171s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libEGL.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libEGL.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.173.189.20.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp

Files

N/A

Analysis: behavioral14

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:58

Platform

win10v2004-20240226-en

Max time kernel

447s

Max time network

1168s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libGLESv2.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libGLESv2.dll,#1

Network

Country Destination Domain Proto
US 138.91.171.81:80 tcp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 42.56.20.217.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 88.65.42.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:54

Platform

win10v2004-20231215-en

Max time kernel

1793s

Max time network

1758s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Epsilon.exe"

Signatures

Epsilon Stealer

stealer epsilon

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Epsilon.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsBootManager = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\0\\WindowsBootManager.exe" C:\Windows\system32\reg.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A

Detects videocard installed

Description Indicator Process Target
N/A N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 460 wrote to memory of 1588 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 460 wrote to memory of 1588 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 1588 wrote to memory of 4172 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1588 wrote to memory of 4172 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3680 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 2728 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 2728 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Users\Admin\AppData\Local\Temp\Epsilon.exe
PID 460 wrote to memory of 3956 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 460 wrote to memory of 3956 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 3956 wrote to memory of 3228 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 3956 wrote to memory of 3228 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 460 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 460 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 460 wrote to memory of 4576 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 460 wrote to memory of 4576 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 460 wrote to memory of 5028 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 460 wrote to memory of 5028 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 2652 wrote to memory of 3652 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 2652 wrote to memory of 3652 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 4576 wrote to memory of 2400 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 4576 wrote to memory of 2400 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\reg.exe
PID 5028 wrote to memory of 3472 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 5028 wrote to memory of 3472 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 460 wrote to memory of 4300 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe
PID 460 wrote to memory of 4300 N/A C:\Users\Admin\AppData\Local\Temp\Epsilon.exe C:\Windows\system32\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Epsilon.exe

"C:\Users\Admin\AppData\Local\Temp\Epsilon.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic CsProduct Get UUID"

C:\Windows\System32\Wbem\WMIC.exe

wmic CsProduct Get UUID

C:\Users\Admin\AppData\Local\Temp\Epsilon.exe

"C:\Users\Admin\AppData\Local\Temp\Epsilon.exe" --type=gpu-process --field-trial-handle=1524,1791525848603596079,15505335676402743230,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --user-data-dir="C:\Users\Admin\AppData\Roaming\Epsilon" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 /prefetch:2

C:\Users\Admin\AppData\Local\Temp\Epsilon.exe

"C:\Users\Admin\AppData\Local\Temp\Epsilon.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1524,1791525848603596079,15505335676402743230,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Epsilon" --mojo-platform-channel-handle=1972 /prefetch:8

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM chrome.exe /F"

C:\Windows\system32\taskkill.exe

taskkill /IM chrome.exe /F

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List"

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe QUERY "HKCU\Software\Valve\Steam" /v SteamPath

C:\Windows\System32\Wbem\WMIC.exe

wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_VideoController get name

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "cmd /c chcp 65001>nul && netsh wlan show profiles"

C:\Windows\system32\cmd.exe

cmd /c chcp 65001

C:\Windows\system32\chcp.com

chcp 65001

C:\Windows\system32\netsh.exe

netsh wlan show profiles

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsBootManager /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsBootManager.exe /f"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v WindowsBootManager /t REG_SZ /d C:\Users\Admin\AppData\Local\Microsoft\Windows\0\WindowsBootManager.exe /f

C:\Windows\system32\tasklist.exe

tasklist

C:\Users\Admin\AppData\Local\Temp\Epsilon.exe

"C:\Users\Admin\AppData\Local\Temp\Epsilon.exe" --type=gpu-process --field-trial-handle=1524,1791525848603596079,15505335676402743230,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\Epsilon" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAIAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAANAAAAEAAAAAAAAAABAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.186.192:443 ipinfo.io tcp
US 8.8.8.8:53 192.186.117.34.in-addr.arpa udp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 119.176.67.172.in-addr.arpa udp
N/A 127.0.0.1:80 tcp
US 8.8.8.8:53 dns.google udp
US 8.8.4.4:443 dns.google tcp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 121.118.77.104.in-addr.arpa udp
US 138.91.171.81:80 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 25.73.42.20.in-addr.arpa udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 54.40.21.104.in-addr.arpa udp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 172.67.176.119:443 panelweb.equi-hosting.fr tcp
US 8.8.8.8:53 panelweb.equi-hosting.fr udp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp
US 104.21.40.54:443 panelweb.equi-hosting.fr tcp

Files

C:\Users\Admin\AppData\Local\Temp\1b25947f-ab6e-4841-b912-68d5649b8523.tmp.node

MD5 1fbfbd5cbf751ea97427cae6f1e89136
SHA1 451926bcb5e20b394e459cc0a7536cf5330afc89
SHA256 19ddd46af98688dd860c2582cea43d990ec63fc5c495c96a1286e8e1095185c1
SHA512 dbfd25abe8d357ddca95541057ee9794f9c475177a9cde9b204494800faec657f9c75fc3e7054e28edbb4e0514eed549f83a32821cb62348f3f81adb95cca583

memory/3680-6-0x00007FFE444F0000-0x00007FFE444F1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\be5a9e43-0cb5-4e31-b5ce-8d46f3623104.tmp.node

MD5 d4e6004197508892d18fc47645b25f62
SHA1 1afceda2531e593c00de7ab994f928a150de5b4d
SHA256 dc29d32decbd161ea4ff1e645d3fdf7a1ce3db0ee25e5485bc19fc775922b71c
SHA512 0be017eaba3764eb9f38e78248528a9e025958e713a8eb4a8f9b03d087267e107ceef8525a4ecfcbb684b077145fb0161e5dbe05f9fd95f8f94a140fe3ceb8a4

C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Credit Cards\All Credit Cards.txt

MD5 dec2be4f1ec3592cea668aa279e7cc9b
SHA1 327cf8ab0c895e10674e00ea7f437784bb11d718
SHA256 753b99d2b4e8c58bfd10995d0c2c19255fe9c8f53703bb27d1b6f76f1f4e83cc
SHA512 81728e3d31b72905b3a09c79d1e307c4e8e79d436fcfe7560a8046b46ca4ae994fdfaeb1bc2328e35f418b8128f2e7239289e84350e142146df9cde86b20bb66

C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\AutoFill Data\All Autofill Data.txt

MD5 810ae82f863a5ffae14d3b3944252a4e
SHA1 5393e27113753191436b14f0cafa8acabcfe6b2a
SHA256 453478914b72d9056472fb1e44c69606c62331452f47a1f3c02190f26501785c
SHA512 2421a397dd2ebb17947167addacd3117f666ddab388e3678168075f58dc8eee15bb49a4aac2290140ae5102924852d27b538740a859d0b35245f505b20f29112

memory/3680-72-0x0000028C60210000-0x0000028C603B1000-memory.dmp

memory/1896-83-0x0000022668D80000-0x0000022668D81000-memory.dmp

memory/1896-84-0x0000022668D80000-0x0000022668D81000-memory.dmp

memory/1896-85-0x0000022668D80000-0x0000022668D81000-memory.dmp

memory/1896-90-0x0000022668D80000-0x0000022668D81000-memory.dmp

memory/1896-89-0x0000022668D80000-0x0000022668D81000-memory.dmp

memory/1896-92-0x0000022668D80000-0x0000022668D81000-memory.dmp

memory/1896-91-0x0000022668D80000-0x0000022668D81000-memory.dmp

memory/1896-94-0x0000022668D80000-0x0000022668D81000-memory.dmp

memory/1896-93-0x0000022668D80000-0x0000022668D81000-memory.dmp

memory/1896-95-0x0000022668D80000-0x0000022668D81000-memory.dmp

Analysis: behavioral6

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:55

Platform

win10v2004-20240226-en

Max time kernel

1788s

Max time network

1803s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3dcompiler_47.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3dcompiler_47.dll,#1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2256,i,18272763564106695635,11201593968620719822,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1404 --field-trial-handle=2256,i,18272763564106695635,11201593968620719822,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 104.193.132.51.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
DE 142.250.186.74:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 74.186.250.142.in-addr.arpa udp

Files

N/A

Analysis: behavioral9

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:56

Platform

win10v2004-20240226-en

Max time kernel

1787s

Max time network

1811s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3688 --field-trial-handle=2256,i,9172343514068348080,519219714517961765,262144 --variations-seed-version /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1400 --field-trial-handle=2256,i,9172343514068348080,519219714517961765,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 121.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 91.16.208.104.in-addr.arpa udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
US 8.8.8.8:53 chromewebstore.googleapis.com udp
DE 142.250.185.170:443 chromewebstore.googleapis.com tcp
US 8.8.8.8:53 170.185.250.142.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp

Files

N/A

Analysis: behavioral15

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:59

Platform

win10v2004-20240226-en

Max time kernel

436s

Max time network

1168s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vk_swiftshader.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vk_swiftshader.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
US 8.8.8.8:53 204.201.50.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral17

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 01:00

Platform

win10v2004-20240226-en

Max time kernel

453s

Max time network

1178s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 428 wrote to memory of 3916 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 428 wrote to memory of 3916 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 428 wrote to memory of 3916 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3916 -ip 3916

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 612

Network

Country Destination Domain Proto
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 25.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:53

Platform

win10v2004-20240226-en

Max time kernel

1473s

Max time network

1491s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeManageVolumePrivilege N/A C:\Windows\System32\svchost.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2912 wrote to memory of 3260 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2912 wrote to memory of 3260 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 2912 wrote to memory of 3260 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3260 -ip 3260

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 628

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k UnistackSvcGroup

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 214.143.182.52.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 154.173.246.72.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp

Files

memory/3228-0-0x0000015DDEAA0000-0x0000015DDEAB0000-memory.dmp

memory/3228-16-0x0000015DDEBA0000-0x0000015DDEBB0000-memory.dmp

memory/3228-32-0x0000015DE6F10000-0x0000015DE6F11000-memory.dmp

memory/3228-34-0x0000015DE6F30000-0x0000015DE6F31000-memory.dmp

memory/3228-35-0x0000015DE6F30000-0x0000015DE6F31000-memory.dmp

memory/3228-36-0x0000015DE7050000-0x0000015DE7051000-memory.dmp

Analysis: behavioral10

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:56

Platform

win10v2004-20231215-en

Max time kernel

442s

Max time network

1168s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\index.js

Signatures

N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\index.js

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 121.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 104.193.132.51.in-addr.arpa udp

Files

N/A

Analysis: behavioral11

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 00:56

Platform

win10v2004-20240226-en

Max time kernel

451s

Max time network

1179s

Command Line

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\screenCapture_1.3.2.bat"

Signatures

Processes

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\screenCapture_1.3.2.bat"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /nologo /r:"Microsoft.VisualBasic.dll" /win32manifest:"app.manifest" /out:"screenCapture_1.3.2.exe" "C:\Users\Admin\AppData\Local\Temp\RESOUR~1\APPASA~1.UNP\NODE_M~1\SCREEN~1\lib\win32\SCREEN~1.BAT"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4B32.tmp" "c:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\CSCCB5E963451D4286B268C073E4D128D.TMP"

C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\screenCapture_1.3.2.exe

screenCapture_1.3.2.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 91.16.208.104.in-addr.arpa udp

Files

\??\c:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\CSCCB5E963451D4286B268C073E4D128D.TMP

MD5 a6f2d21624678f54a2abed46e9f3ab17
SHA1 a2a6f07684c79719007d434cbd1cd2164565734a
SHA256 ab96911d094b6070cbfb48e07407371ddb41b86e36628b6a10cdb11478192344
SHA512 0b286df41c3887eecff5c38cbd6818078313b555ef001151b41ac11b80466b2f4f39da518ab9c51eeff35295cb39d52824de13e026c35270917d7274f764c676

C:\Users\Admin\AppData\Local\Temp\RES4B32.tmp

MD5 4249f7bb0b2b84c4872994117ad4284b
SHA1 6cb205d3cea70481bb0c3fb5b66e895f88fb20cf
SHA256 8efae4e410479a970b3cd9423c0e817415fbe4d15f9bce968ea4cd30f3ccf760
SHA512 2b513beaa51823c90b0c0f7e2e2937c4c474d8e00bc9e9ce1cda225684a1074aa10f37adbc6c7352884c0dd94f2f0829a5e490403ff95b0b57f7d5815deb535b

C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\node_modules\screenshot-desktop\lib\win32\screenCapture_1.3.2.exe

MD5 dfeffc4ba2545f9f9f8812a765504c16
SHA1 d47c6c87e1d36bfb7b482efe6ba47a87eba09b9b
SHA256 bba2df59e4dd7342ec7f8c5b7e4123c7276f4cffa9bc114d858ad7c9077bf0c3
SHA512 4b52697937e20735845d2c20c9471317070d4210b21141c54d278611c2d57ba3d4a564f721267b9cd6b31abf61800d985ca97978fa079e2d4106c48204542ed6

memory/544-9-0x0000000000270000-0x000000000027A000-memory.dmp

memory/544-11-0x00007FF8B6E80000-0x00007FF8B7941000-memory.dmp

memory/544-12-0x00007FF8B6E80000-0x00007FF8B7941000-memory.dmp

Analysis: behavioral16

Detonation Overview

Submitted

2024-04-07 23:49

Reported

2024-04-08 01:00

Platform

win10v2004-20240226-en

Max time kernel

1163s

Max time network

1175s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 18.173.189.20.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp

Files

N/A