Malware Analysis Report

2024-09-11 08:41

Sample ID 240427-3exklabb8w
Target a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3
SHA256 a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3
Tags
amadey evasion persistence trojan glupteba risepro xworm collection discovery dropper loader rat spyware stealer themida
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3

Threat Level: Known bad

The file a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3 was found to be: Known bad.

Malicious Activity Summary

amadey evasion persistence trojan glupteba risepro xworm collection discovery dropper loader rat spyware stealer themida

RisePro

Glupteba payload

Amadey

Xworm

Glupteba

Detect Xworm Payload

Identifies VirtualBox via ACPI registry values (likely anti-VM)

Downloads MZ/PE file

Loads dropped DLL

Drops startup file

Checks computer location settings

Reads user/profile data of web browsers

Identifies Wine through registry keys

Themida packer

Checks BIOS information in registry

Reads user/profile data of local email clients

Executes dropped EXE

Checks installed software on the system

Accesses Microsoft Outlook profiles

Looks up external IP address via web service

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

Suspicious use of NtSetInformationThreadHideFromDebugger

Suspicious use of SetThreadContext

AutoIT Executable

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Program crash

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

outlook_office_path

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Suspicious use of AdjustPrivilegeToken

outlook_win_path

Creates scheduled task(s)

Enumerates system info in registry

Checks processor information in registry

Modifies data under HKEY_USERS

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-27 23:26

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-27 23:26

Reported

2024-04-27 23:28

Platform

win7-20240221-en

Max time kernel

54s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe"

Signatures

Amadey

trojan amadey

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\1000017002\49e24d942e.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\1000017002\49e24d942e.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\1000017002\49e24d942e.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Wine C:\Users\Admin\1000017002\49e24d942e.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\49e24d942e.exe = "C:\\Users\\Admin\\1000017002\\49e24d942e.exe" C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\5daeadd199.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\5daeadd199.exe" C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\explorta.job C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
File created C:\Windows\Tasks\chrosha.job C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2228 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 2228 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 2228 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 2228 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 2664 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 2664 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 2664 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 2664 wrote to memory of 2524 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 2664 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe
PID 2664 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe
PID 2664 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe
PID 2664 wrote to memory of 1344 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe
PID 2664 wrote to memory of 1428 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe
PID 2664 wrote to memory of 1428 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe
PID 2664 wrote to memory of 1428 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe
PID 2664 wrote to memory of 1428 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe
PID 1428 wrote to memory of 2224 N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1428 wrote to memory of 2224 N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1428 wrote to memory of 2224 N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1428 wrote to memory of 2224 N/A C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2412 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 2872 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 1092 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2224 wrote to memory of 1092 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe

"C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe"

C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"

C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"

C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe

"C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe"

C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe

"C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ad9758,0x7fef6ad9768,0x7fef6ad9778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1184,i,16024520107076861270,605458562672980351,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1408 --field-trial-handle=1184,i,16024520107076861270,605458562672980351,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1504 --field-trial-handle=1184,i,16024520107076861270,605458562672980351,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1184,i,16024520107076861270,605458562672980351,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2280 --field-trial-handle=1184,i,16024520107076861270,605458562672980351,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3116 --field-trial-handle=1184,i,16024520107076861270,605458562672980351,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1236 --field-trial-handle=1184,i,16024520107076861270,605458562672980351,131072 /prefetch:2

C:\Users\Admin\1000017002\49e24d942e.exe

"C:\Users\Admin\1000017002\49e24d942e.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2456 --field-trial-handle=1184,i,16024520107076861270,605458562672980351,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3460 --field-trial-handle=1184,i,16024520107076861270,605458562672980351,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3756 --field-trial-handle=1184,i,16024520107076861270,605458562672980351,131072 /prefetch:8

Network

Country Destination Domain Proto
RU 193.233.132.139:80 193.233.132.139 tcp
RU 193.233.132.167:80 193.233.132.167 tcp
US 8.8.8.8:53 www.youtube.com udp
GB 142.250.187.206:443 www.youtube.com tcp
US 8.8.8.8:53 www.youtube.com udp
GB 142.250.187.206:443 www.youtube.com tcp
US 8.8.8.8:53 accounts.google.com udp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com udp
US 8.8.8.8:53 content-autofill.googleapis.com udp
GB 216.58.212.202:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 accounts.youtube.com udp
GB 172.217.16.238:443 accounts.youtube.com tcp
US 8.8.8.8:53 www.google.com udp
GB 172.217.16.228:443 www.google.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 play.google.com udp
GB 142.250.187.206:443 play.google.com tcp
GB 142.250.187.206:443 play.google.com udp
NL 173.194.69.84:443 accounts.google.com udp
NL 173.194.69.84:443 accounts.google.com udp
US 8.8.8.8:53 beacons.gcp.gvt2.com udp
US 192.178.49.163:443 beacons.gcp.gvt2.com tcp
US 192.178.49.163:443 beacons.gcp.gvt2.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
US 8.8.8.8:53 beacons3.gvt2.com udp
GB 172.217.169.67:443 beacons3.gvt2.com tcp
GB 172.217.169.67:443 beacons3.gvt2.com udp
GB 172.217.169.67:443 beacons3.gvt2.com udp
US 8.8.8.8:53 accounts.google.com udp
US 192.178.49.163:443 beacons.gcp.gvt2.com udp
NL 173.194.69.84:443 accounts.google.com udp

Files

memory/2228-0-0x0000000000B50000-0x0000000000FF3000-memory.dmp

memory/2228-1-0x0000000077450000-0x0000000077452000-memory.dmp

memory/2228-2-0x00000000025F0000-0x00000000025F1000-memory.dmp

memory/2228-3-0x0000000002850000-0x0000000002851000-memory.dmp

memory/2228-10-0x00000000025D0000-0x00000000025D1000-memory.dmp

memory/2228-13-0x0000000002490000-0x0000000002491000-memory.dmp

memory/2228-12-0x0000000000B40000-0x0000000000B41000-memory.dmp

memory/2228-11-0x0000000002980000-0x0000000002981000-memory.dmp

memory/2228-9-0x00000000024B0000-0x00000000024B1000-memory.dmp

memory/2228-8-0x0000000002480000-0x0000000002481000-memory.dmp

memory/2228-7-0x00000000025E0000-0x00000000025E1000-memory.dmp

memory/2228-6-0x00000000004E0000-0x00000000004E1000-memory.dmp

memory/2228-5-0x0000000002990000-0x0000000002991000-memory.dmp

memory/2228-4-0x00000000025C0000-0x00000000025C1000-memory.dmp

memory/2228-16-0x00000000029A0000-0x00000000029A1000-memory.dmp

memory/2228-15-0x00000000024A0000-0x00000000024A1000-memory.dmp

memory/2228-17-0x0000000000B20000-0x0000000000B21000-memory.dmp

memory/2228-18-0x0000000002D50000-0x0000000002D51000-memory.dmp

\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

MD5 30eaa6612e0ebe3b2bb75ca173df2c49
SHA1 1abb4b0329724f2423e9ab0d9670b271c899e926
SHA256 a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3
SHA512 392c863547b636af3a78a21e8bfdf8be0f05576d0e815bbf5770d88a121534c59ce7829c919e3d63ce65d879e229680bbf6ad17b5656f22bb5e847f442adf7d6

memory/2664-30-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2228-29-0x0000000000B50000-0x0000000000FF3000-memory.dmp

memory/2228-27-0x0000000006FC0000-0x0000000007463000-memory.dmp

memory/2664-31-0x00000000029F0000-0x00000000029F1000-memory.dmp

memory/2664-42-0x0000000000C60000-0x0000000000C61000-memory.dmp

memory/2664-41-0x0000000000C00000-0x0000000000C01000-memory.dmp

memory/2664-40-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

memory/2664-39-0x0000000000FA0000-0x0000000000FA1000-memory.dmp

memory/2664-38-0x0000000000EC0000-0x0000000000EC1000-memory.dmp

memory/2664-37-0x0000000000C50000-0x0000000000C51000-memory.dmp

memory/2664-36-0x0000000000FB0000-0x0000000000FB1000-memory.dmp

memory/2664-35-0x0000000000B90000-0x0000000000B91000-memory.dmp

memory/2664-34-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

memory/2664-33-0x0000000000ED0000-0x0000000000ED1000-memory.dmp

memory/2664-32-0x0000000002A10000-0x0000000002A11000-memory.dmp

memory/2664-46-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

memory/2664-45-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

memory/2664-44-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

memory/2664-50-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

memory/2664-51-0x0000000009F40000-0x000000000A3E3000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe

MD5 721488e115833499dc629df16a830832
SHA1 3bb57d01c8f6b9807cf3f1992ba1305af2626bae
SHA256 2c985cf56c076f1058b4868a6b860845cb8972cd3af3732b54e8c95766c1d581
SHA512 369a8717b9e4ba67e0960538ba43c4b1d8001e7398eb45e03136b2762be0c2a17e5ff3139e9f85604c0169b734187b8309915d935fcff8abeaa6ef80a0a5ed27

memory/2664-63-0x0000000006840000-0x0000000006CF6000-memory.dmp

memory/1344-66-0x00000000008B0000-0x0000000000D66000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000016001\5daeadd199.exe

MD5 439813a50ba41286e233bbe9e9733165
SHA1 df2aa0501336451a974a8be34229ca65bdfd8567
SHA256 fa51f58a27e76311e2117256eb500ab4a85b4f117b13d4d7b0d0fed5488b11ac
SHA512 5a9aad7d91148c0a96044c31f555f6e520518b210211cd4ef05cc16b668d6c5e8297f1685eb3b1c0ef5c03988b4f9119ebc67cbd7c436b3f7c12952cca85dc25

memory/1344-87-0x00000000008B0000-0x0000000000D66000-memory.dmp

\??\pipe\crashpad_2224_JLMNELCXMUDKFHBF

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\CURRENT

MD5 18e723571b00fb1694a3bad6c78e4054
SHA1 afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA256 8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA512 43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\1000017002\49e24d942e.exe

MD5 c876f49d727613e509154ebb990094ec
SHA1 1b8892b52dd847ae6f47e980b3e042e0fe67bcb9
SHA256 e2070d56c968170581ec143a875ebcd21aa3de67068dcd53fe2a7abfe8e68d4f
SHA512 b3b4430d529109d066ca3ab732b1cd3877ffab9048e4aa55970518d39d1d8e590c729d47271af91f24892d60cf92586140e928cff1c09a187f7514e6c1019291

memory/2664-162-0x0000000006840000-0x0000000006E2B000-memory.dmp

memory/2040-163-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-161-0x0000000006840000-0x0000000006E2B000-memory.dmp

memory/2664-179-0x0000000001000000-0x00000000014A3000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

MD5 aefd77f47fb84fae5ea194496b44c67a
SHA1 dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA256 4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512 b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

memory/2040-202-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-201-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2664-207-0x0000000009F40000-0x000000000A3E3000-memory.dmp

memory/2664-214-0x0000000006840000-0x0000000006CF6000-memory.dmp

memory/2040-213-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-212-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2040-216-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-215-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2040-218-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-217-0x0000000006840000-0x0000000006E2B000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 51e0666904f27119161808eee31a89cd
SHA1 8512f06c90bd460171825241ca88d3b87dd72efd
SHA256 c9194f942e2c5906855184e0edbba131aac9c3048815537a426233e1cff64c6e
SHA512 0e5654fac236e005192d31a9d930392e0bc85537faa830c2edea78d9120eb361719a3a7bb6b08b17488cfb2dc648d917d035fddbf4a01283a0f8eff9ffad296f

memory/2040-226-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-227-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2040-229-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-228-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2040-233-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-232-0x0000000001000000-0x00000000014A3000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 99c6413cc20519c9c33ca242900786b4
SHA1 65065a3b25cbdebfcc9178d732e321d98a125fbd
SHA256 10a1bb02ad2f1ed3028a499ddc5d391c330d0763788c61a9870dedd748ebe9fc
SHA512 bd4fcd6f042dabdb6874178aa3f682001dd2d1a604c18f02610d73d1b2a74493dd40647e20b44e99e930e7dda77b501a472a8f0c71d4ad18d4057dc01692bbd3

memory/2040-246-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-245-0x0000000001000000-0x00000000014A3000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 489a6070fc26a52d94a84e1b36ae8a5d
SHA1 b064f21c67bcb73ac3e3ab0a490c0ba8c19c3b39
SHA256 cc3159a12d539ae9738b1bf32ba77828329517c384bb6195b478b08ee14c4428
SHA512 63fa68dba130618a697f77ca2203a9e40881532b7240b0b5ff252350498cc25743a6ccfa19b17c9c34989949df86cf1f35c56c2402dbe852315d4f1bfef2b1f9

memory/2040-255-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-254-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2664-256-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2040-257-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-258-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2040-259-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2040-260-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-261-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2040-263-0x00000000012C0000-0x00000000018AB000-memory.dmp

memory/2664-262-0x0000000001000000-0x00000000014A3000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 8ab642ee6cceb0bcd7709337d61ad3bf
SHA1 89f7a778cfbcc1d9e1bf31e832f6aab66c3d8efc
SHA256 a299deeafd7f66402cbd7213e800818a4b42aef3c25c6afe013105c7e10a1cd8
SHA512 78f8e2ea4baaef96df721acafc62170d7eabc714efea76b16867104dd8d15a1ac35b4094984dd4a42f828b7b30989a0b14682b8cff98de4ccbc508356ad0c0ae

memory/2664-271-0x0000000001000000-0x00000000014A3000-memory.dmp

memory/2040-272-0x00000000012C0000-0x00000000018AB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-27 23:26

Reported

2024-04-27 23:27

Platform

win10v2004-20240426-en

Max time kernel

45s

Max time network

62s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe"

Signatures

Amadey

trojan amadey

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A

RisePro

stealer risepro

Xworm

trojan rat xworm

Identifies VirtualBox via ACPI registry values (likely anti-VM)

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\O14s8JDKgZiai018g0Al.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\YvScKGYGZGiiqiIrSNRY.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C:\Users\Admin\1000017002\db3b2b68f2.exe N/A

Downloads MZ/PE file

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\O14s8JDKgZiai018g0Al.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\YvScKGYGZGiiqiIrSNRY.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\O14s8JDKgZiai018g0Al.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\YvScKGYGZGiiqiIrSNRY.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7wWXA2z0LvJ1duapWoUe2sT8.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AU36feXSdOHNdzNos9CiSCiq.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PDh94V2KlxZxOKBQADHZkZYh.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\9rDPqldJ0SY88f7WUZKlBBuD.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EdgeMS131.lnk C:\Users\Admin\1000017002\db3b2b68f2.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\O14s8JDKgZiai018g0Al.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\YvScKGYGZGiiqiIrSNRY.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A

Reads user/profile data of local email clients

spyware stealer

Reads user/profile data of web browsers

spyware stealer

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Accesses Microsoft Outlook profiles

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\1000017002\db3b2b68f2.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\db3b2b68f2.exe = "C:\\Users\\Admin\\1000017002\\db3b2b68f2.exe" C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RageMP131 = "C:\\Users\\Admin\\AppData\\Local\\RageMP131\\RageMP131.exe" C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_999e43077df71fdfc52bd5232a22cf9d = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_999e43077df71fdfc52bd5232a22cf9d\\AdobeUpdaterV131.exe" C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae\\AdobeUpdaterV131.exe" C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7 = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7\\AdobeUpdaterV131.exe" C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cd78a3544c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\cd78a3544c.exe" C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A
N/A api.myip.com N/A N/A
N/A api.myip.com N/A N/A
N/A ip-api.com N/A N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 6084 set thread context of 6312 N/A C:\Users\Admin\AppData\Local\Temp\1000238001\file300un.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\Tasks\explorta.job C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
File created C:\Windows\Tasks\chrosha.job C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\1000017002\db3b2b68f2.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133587339931858572" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4018855536-2201274732-320770143-1000\{D25B253C-04A3-4318-A070-2D2CBD2258A2} C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
N/A N/A C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
N/A N/A C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
N/A N/A C:\Users\Admin\1000017002\db3b2b68f2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\O14s8JDKgZiai018g0Al.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\O14s8JDKgZiai018g0Al.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\YvScKGYGZGiiqiIrSNRY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\YvScKGYGZGiiqiIrSNRY.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\VGB5K0bTRLLo2atrwdUH.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\VGB5K0bTRLLo2atrwdUH.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\VGB5K0bTRLLo2atrwdUH.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\VGB5K0bTRLLo2atrwdUH.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\VGB5K0bTRLLo2atrwdUH.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\VGB5K0bTRLLo2atrwdUH.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 5096 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 5096 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 5096 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 1688 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 1688 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 1688 wrote to memory of 1040 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe
PID 1688 wrote to memory of 4516 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe
PID 1688 wrote to memory of 4516 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe
PID 1688 wrote to memory of 4516 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe
PID 1688 wrote to memory of 3152 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe
PID 1688 wrote to memory of 3152 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe
PID 1688 wrote to memory of 3152 N/A C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe
PID 3152 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3152 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3576 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3576 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3196 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3604 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 3604 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2560 wrote to memory of 2952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

outlook_office_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\1000017002\db3b2b68f2.exe N/A

outlook_win_path

Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 C:\Users\Admin\1000017002\db3b2b68f2.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe

"C:\Users\Admin\AppData\Local\Temp\a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3.exe"

C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"

C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

"C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe"

C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe

"C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe"

C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe

"C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc8f6ab58,0x7fffc8f6ab68,0x7fffc8f6ab78

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1684 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3076 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3088 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3616 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:1

C:\Users\Admin\1000017002\db3b2b68f2.exe

"C:\Users\Admin\1000017002\db3b2b68f2.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3276 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4576 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5080 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 --field-trial-handle=1936,i,15605404711410098140,11381818448282310030,131072 /prefetch:8

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_999e43077df71fdfc52bd5232a22cf9d\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_999e43077df71fdfc52bd5232a22cf9d HR" /sc HOURLY /rl HIGHEST

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_999e43077df71fdfc52bd5232a22cf9d\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_999e43077df71fdfc52bd5232a22cf9d LG" /sc ONLOGON /rl HIGHEST

C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\O14s8JDKgZiai018g0Al.exe

"C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\O14s8JDKgZiai018g0Al.exe"

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae HR" /sc HOURLY /rl HIGHEST

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_a5899eff6c87eb6c8acb1b5c9328dfae LG" /sc ONLOGON /rl HIGHEST

C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\VGB5K0bTRLLo2atrwdUH.exe

"C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\VGB5K0bTRLLo2atrwdUH.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffb87446f8,0x7fffb8744708,0x7fffb8744718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffb87446f8,0x7fffb8744708,0x7fffb8744718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb87446f8,0x7fffb8744708,0x7fffb8744718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:8

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7 HR" /sc HOURLY /rl HIGHEST

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1560,7407413293572933946,13805397283015032584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2148 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,3386905668415522274,5511944589461376495,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2096 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:1

C:\Windows\SysWOW64\schtasks.exe

schtasks /create /f /RU "Admin" /tr "C:\ProgramData\MSIUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7\MSIUpdaterV131.exe" /tn "MSIUpdaterV131_72e6459d9280e67b92be0cfd9c31abc7 LG" /sc ONLOGON /rl HIGHEST

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:1

C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\YvScKGYGZGiiqiIrSNRY.exe

"C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\YvScKGYGZGiiqiIrSNRY.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:1

C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe

C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe

C:\Users\Admin\AppData\Local\Temp\1000238001\file300un.exe

"C:\Users\Admin\AppData\Local\Temp\1000238001\file300un.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"

C:\Users\Admin\AppData\Local\Temp\1000239001\mstc.exe

"C:\Users\Admin\AppData\Local\Temp\1000239001\mstc.exe"

C:\Users\Admin\Pictures\bK33yNq3aLA3mGt9BSINxRiF.exe

"C:\Users\Admin\Pictures\bK33yNq3aLA3mGt9BSINxRiF.exe"

C:\Users\Admin\Pictures\z2pkeQRK9WQylMDaVVswDpBX.exe

"C:\Users\Admin\Pictures\z2pkeQRK9WQylMDaVVswDpBX.exe"

C:\Users\Admin\Pictures\pXQy1Jd90dwfjvKDgBKX4qWB.exe

"C:\Users\Admin\Pictures\pXQy1Jd90dwfjvKDgBKX4qWB.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Users\Admin\Pictures\tdifi1Rzp7N58vGj1lRGI2Ex.exe

"C:\Users\Admin\Pictures\tdifi1Rzp7N58vGj1lRGI2Ex.exe"

C:\Users\Admin\AppData\Local\Temp\u5ew.0.exe

"C:\Users\Admin\AppData\Local\Temp\u5ew.0.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3311878038193355335,9252182522721757964,131072 --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:1

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1000239001\mstc.exe'

C:\Users\Admin\AppData\Local\Temp\u5ew.2\run.exe

"C:\Users\Admin\AppData\Local\Temp\u5ew.2\run.exe"

C:\Users\Admin\Pictures\MHJaHYAcg1N5hyyyfZ6DlMGl.exe

"C:\Users\Admin\Pictures\MHJaHYAcg1N5hyyyfZ6DlMGl.exe" --silent --allusers=0

C:\Windows\SysWOW64\cmd.exe

C:\Windows\SysWOW64\cmd.exe

C:\Users\Admin\Pictures\MHJaHYAcg1N5hyyyfZ6DlMGl.exe

C:\Users\Admin\Pictures\MHJaHYAcg1N5hyyyfZ6DlMGl.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.68 --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0x6e81e1d0,0x6e81e1dc,0x6e81e1e8

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\MHJaHYAcg1N5hyyyfZ6DlMGl.exe

"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\MHJaHYAcg1N5hyyyfZ6DlMGl.exe" --version

C:\Users\Admin\Pictures\p5TBe4cxaT5wyUKg2Xb3n6sq.exe

"C:\Users\Admin\Pictures\p5TBe4cxaT5wyUKg2Xb3n6sq.exe"

C:\Users\Admin\Pictures\MHJaHYAcg1N5hyyyfZ6DlMGl.exe

"C:\Users\Admin\Pictures\MHJaHYAcg1N5hyyyfZ6DlMGl.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=6748 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240427232712" --session-guid=c45b508a-4db1-4e79-b496-381a9f7ee3df --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=4C04000000000000

C:\Users\Admin\AppData\Local\Temp\u5ew.3.exe

"C:\Users\Admin\AppData\Local\Temp\u5ew.3.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 7016 -ip 7016

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 7016 -s 1620

C:\Users\Admin\Pictures\MHJaHYAcg1N5hyyyfZ6DlMGl.exe

C:\Users\Admin\Pictures\MHJaHYAcg1N5hyyyfZ6DlMGl.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.68 --initial-client-data=0x2a4,0x2a8,0x2ac,0x274,0x2b0,0x6da1e1d0,0x6da1e1dc,0x6da1e1e8

C:\Users\Admin\AppData\Local\Temp\7zSF5.tmp\Install.exe

.\Install.exe /WkfdidVYT "385118" /S

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main

C:\Windows\system32\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main

C:\Windows\system32\netsh.exe

netsh wlan show profiles

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6" & forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147735503 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147814524 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147814524 /t REG_SZ /d 6

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'mstc.exe'

C:\Users\Admin\Pictures\z2pkeQRK9WQylMDaVVswDpBX.exe

"C:\Users\Admin\Pictures\z2pkeQRK9WQylMDaVVswDpBX.exe"

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m where.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147780199 /t REG_SZ /d 6"

C:\Users\Admin\Pictures\pXQy1Jd90dwfjvKDgBKX4qWB.exe

"C:\Users\Admin\Pictures\pXQy1Jd90dwfjvKDgBKX4qWB.exe"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147780199 /t REG_SZ /d 6

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m waitfor.exe /c "cmd /C reg add \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v 2147812831 /t REG_SZ /d 6"

C:\Windows\SysWOW64\cmd.exe

/C reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6

\??\c:\windows\SysWOW64\reg.exe

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147812831 /t REG_SZ /d 6

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\018855536220_Desktop.zip' -CompressionLevel Optimal

C:\Windows\SysWOW64\forfiles.exe

forfiles /p c:\windows\system32 /m help.exe /c "cmd /C powershell start-process -WindowStyle Hidden gpupdate.exe /force"

C:\Windows\SysWOW64\cmd.exe

/C powershell start-process -WindowStyle Hidden gpupdate.exe /force

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell start-process -WindowStyle Hidden gpupdate.exe /force

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\explorer.exe'

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
NL 23.62.61.97:443 www.bing.com tcp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 97.61.62.23.in-addr.arpa udp
RU 193.233.132.139:80 193.233.132.139 tcp
RU 193.233.132.167:80 193.233.132.167 tcp
US 8.8.8.8:53 139.132.233.193.in-addr.arpa udp
US 8.8.8.8:53 167.132.233.193.in-addr.arpa udp
US 8.8.8.8:53 www.youtube.com udp
GB 142.250.187.206:443 www.youtube.com tcp
US 8.8.8.8:53 195.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 10.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 206.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 accounts.google.com udp
NL 173.194.69.84:443 accounts.google.com udp
US 8.8.8.8:53 84.69.194.173.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 227.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 content-autofill.googleapis.com udp
GB 216.58.212.202:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 accounts.youtube.com udp
GB 172.217.16.238:443 accounts.youtube.com tcp
US 8.8.8.8:53 www.google.com udp
GB 142.250.178.4:443 www.google.com udp
US 8.8.8.8:53 202.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 238.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 4.178.250.142.in-addr.arpa udp
GB 142.250.178.4:443 www.google.com tcp
US 8.8.8.8:53 clients2.google.com udp
GB 172.217.16.238:443 clients2.google.com udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 play.google.com udp
GB 142.250.187.206:443 play.google.com tcp
GB 142.250.187.206:443 play.google.com udp
RU 147.45.47.93:58709 tcp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.186.192:443 ipinfo.io tcp
US 8.8.8.8:53 db-ip.com udp
US 104.26.4.15:443 db-ip.com tcp
US 8.8.8.8:53 192.186.117.34.in-addr.arpa udp
US 8.8.8.8:53 93.47.45.147.in-addr.arpa udp
US 8.8.8.8:53 15.4.26.104.in-addr.arpa udp
RU 147.45.47.102:80 tcp
RU 147.45.47.102:57893 147.45.47.102 tcp
US 8.8.8.8:53 102.47.45.147.in-addr.arpa udp
RU 193.233.132.167:80 193.233.132.167 tcp
US 8.8.8.8:53 www.facebook.com udp
GB 163.70.151.35:443 www.facebook.com tcp
GB 142.250.187.206:443 play.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com tcp
NL 173.194.69.84:443 accounts.google.com udp
US 8.8.8.8:53 35.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 scontent.xx.fbcdn.net udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
US 8.8.8.8:53 video.xx.fbcdn.net udp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 21.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
GB 142.250.178.4:443 www.google.com tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 scontent-lhr6-2.xx.fbcdn.net udp
RU 147.45.47.93:58709 tcp
US 34.117.186.192:443 ipinfo.io tcp
US 104.26.4.15:443 db-ip.com tcp
RU 193.233.132.167:80 193.233.132.167 tcp
RU 193.233.132.234:80 193.233.132.234 tcp
GB 142.250.187.206:443 play.google.com tcp
GB 142.250.187.206:443 play.google.com udp
US 8.8.8.8:53 234.132.233.193.in-addr.arpa udp
US 8.8.8.8:53 file-drop.cc udp
US 104.21.95.172:443 file-drop.cc tcp
US 8.8.8.8:53 pastebin.com udp
US 8.8.8.8:53 yip.su udp
US 172.67.169.89:443 yip.su tcp
US 104.20.3.235:443 pastebin.com tcp
US 8.8.8.8:53 172.95.21.104.in-addr.arpa udp
RU 193.233.132.175:80 193.233.132.175 tcp
DE 185.172.128.59:80 185.172.128.59 tcp
US 8.8.8.8:53 skategirls.org udp
RU 193.233.132.234:80 193.233.132.234 tcp
RU 193.233.132.234:80 193.233.132.234 tcp
US 8.8.8.8:53 realdeepai.org udp
US 8.8.8.8:53 net.geo.opera.com udp
NL 185.26.182.111:80 net.geo.opera.com tcp
US 104.21.90.14:443 realdeepai.org tcp
US 104.21.90.14:443 realdeepai.org tcp
NL 185.26.182.111:443 net.geo.opera.com tcp
US 8.8.8.8:53 jonathantwo.com udp
US 172.67.176.131:443 jonathantwo.com tcp
US 172.67.176.131:443 jonathantwo.com tcp
DE 185.172.128.90:80 185.172.128.90 tcp
US 8.8.8.8:53 89.169.67.172.in-addr.arpa udp
US 8.8.8.8:53 235.3.20.104.in-addr.arpa udp
US 8.8.8.8:53 59.128.172.185.in-addr.arpa udp
US 8.8.8.8:53 175.132.233.193.in-addr.arpa udp
US 8.8.8.8:53 111.182.26.185.in-addr.arpa udp
US 8.8.8.8:53 14.90.21.104.in-addr.arpa udp
US 8.8.8.8:53 131.176.67.172.in-addr.arpa udp
US 8.8.8.8:53 90.128.172.185.in-addr.arpa udp
DE 185.172.128.228:80 185.172.128.228 tcp
DE 185.172.128.59:80 185.172.128.59 tcp
US 8.8.8.8:53 228.128.172.185.in-addr.arpa udp
US 8.8.8.8:53 note.padd.cn.com udp
RO 176.97.76.106:80 note.padd.cn.com tcp
RU 5.42.66.10:80 5.42.66.10 tcp
US 8.8.8.8:53 api.myip.com udp
US 104.26.9.59:443 api.myip.com tcp
US 8.8.8.8:53 106.76.97.176.in-addr.arpa udp
US 8.8.8.8:53 10.66.42.5.in-addr.arpa udp
US 8.8.8.8:53 ip-api.com udp
US 8.8.8.8:53 ipinfo.io udp
US 208.95.112.1:80 ip-api.com tcp
US 34.117.186.192:443 ipinfo.io tcp
US 8.8.8.8:53 59.9.26.104.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
DE 185.172.128.228:80 185.172.128.228 tcp
RU 193.233.132.234:80 193.233.132.234 tcp
US 8.8.8.8:53 autoupdate.geo.opera.com udp
US 8.8.8.8:53 desktop-netinstaller-sub.osp.opera.software udp
NL 185.26.182.123:443 autoupdate.geo.opera.com tcp
NL 185.26.182.123:443 autoupdate.geo.opera.com tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
US 8.8.8.8:53 svc.iolo.com udp
US 20.157.87.45:80 svc.iolo.com tcp
US 8.8.8.8:53 121.217.145.82.in-addr.arpa udp
US 8.8.8.8:53 123.182.26.185.in-addr.arpa udp
US 8.8.8.8:53 45.87.157.20.in-addr.arpa udp
US 8.8.8.8:53 iplogger.com udp
US 172.67.188.178:443 iplogger.com tcp
US 8.8.8.8:53 download.opera.com udp
US 8.8.8.8:53 features.opera-api2.com udp
NL 185.26.182.93:443 features.opera-api2.com tcp
NL 82.145.216.23:443 download.opera.com tcp
DE 185.172.128.62:80 185.172.128.62 tcp
US 8.8.8.8:53 download3.operacdn.com udp
NL 2.17.112.33:443 download3.operacdn.com tcp
US 8.8.8.8:53 93.182.26.185.in-addr.arpa udp
US 8.8.8.8:53 178.188.67.172.in-addr.arpa udp
US 8.8.8.8:53 23.216.145.82.in-addr.arpa udp
US 8.8.8.8:53 62.128.172.185.in-addr.arpa udp
RU 193.233.132.167:80 193.233.132.167 tcp
RU 5.42.66.10:80 5.42.66.10 tcp
RU 5.42.66.10:80 5.42.66.10 tcp
US 8.8.8.8:53 togaterecutirenics.sbs udp
DE 185.172.128.203:80 185.172.128.203 tcp
US 8.8.8.8:53 wikkt.com udp
RU 193.233.132.139:80 193.233.132.139 tcp
US 8.8.8.8:53 vk.com udp
US 8.8.8.8:53 triedchicken.net udp
US 8.8.8.8:53 zanzibarpivo.com udp
US 8.8.8.8:53 monoblocked.com udp
US 8.8.8.8:53 dod.fastbutters.com udp
RU 87.240.132.67:80 vk.com tcp
RU 87.240.132.67:80 vk.com tcp
US 172.67.180.119:80 triedchicken.net tcp
RU 45.130.41.108:80 monoblocked.com tcp
US 104.21.49.118:80 dod.fastbutters.com tcp
US 8.8.8.8:53 dkgxxh1czdosr.cloudfront.net udp
US 172.67.136.153:80 togaterecutirenics.sbs tcp
US 104.21.10.62:80 zanzibarpivo.com tcp
US 8.8.8.8:53 33.112.17.2.in-addr.arpa udp
US 8.8.8.8:53 203.128.172.185.in-addr.arpa udp
US 8.8.8.8:53 119.180.67.172.in-addr.arpa udp
US 104.21.10.62:80 zanzibarpivo.com tcp
US 104.21.10.62:80 zanzibarpivo.com tcp
US 172.67.180.119:80 triedchicken.net tcp
US 104.21.10.62:443 zanzibarpivo.com tcp
US 172.67.180.119:80 triedchicken.net tcp
CO 181.129.118.140:80 wikkt.com tcp
US 172.67.180.119:443 triedchicken.net tcp
US 172.67.136.153:443 togaterecutirenics.sbs tcp
CO 181.129.118.140:80 wikkt.com tcp
US 8.8.8.8:53 153.136.67.172.in-addr.arpa udp
US 8.8.8.8:53 62.10.21.104.in-addr.arpa udp
US 8.8.8.8:53 140.118.129.181.in-addr.arpa udp
US 8.8.8.8:53 67.132.240.87.in-addr.arpa udp
RU 87.240.132.67:80 vk.com tcp
RU 45.130.41.108:80 monoblocked.com tcp
RU 87.240.132.67:80 vk.com tcp
RU 45.130.41.108:80 monoblocked.com tcp
RU 45.130.41.108:443 monoblocked.com tcp
US 8.8.8.8:53 108.41.130.45.in-addr.arpa udp
US 104.21.49.118:80 dod.fastbutters.com tcp
RU 87.240.132.67:80 vk.com tcp
US 104.21.49.118:80 dod.fastbutters.com tcp
US 104.21.49.118:443 dod.fastbutters.com tcp
RU 87.240.132.67:80 vk.com tcp
RU 87.240.132.67:80 vk.com tcp

Files

memory/5096-0-0x0000000000600000-0x0000000000AA3000-memory.dmp

memory/5096-1-0x00000000779D4000-0x00000000779D6000-memory.dmp

memory/5096-2-0x0000000004A30000-0x0000000004A31000-memory.dmp

memory/5096-3-0x0000000004A20000-0x0000000004A21000-memory.dmp

memory/5096-7-0x0000000004A40000-0x0000000004A41000-memory.dmp

memory/5096-6-0x0000000004A10000-0x0000000004A11000-memory.dmp

memory/5096-5-0x0000000004A00000-0x0000000004A01000-memory.dmp

memory/5096-4-0x0000000004A60000-0x0000000004A61000-memory.dmp

memory/5096-8-0x0000000004A80000-0x0000000004A81000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\5454e6f062\explorta.exe

MD5 30eaa6612e0ebe3b2bb75ca173df2c49
SHA1 1abb4b0329724f2423e9ab0d9670b271c899e926
SHA256 a3a58570282b8de288ba63fb0dff86b5d0a450ddbd6993d1897046e6a7148fe3
SHA512 392c863547b636af3a78a21e8bfdf8be0f05576d0e815bbf5770d88a121534c59ce7829c919e3d63ce65d879e229680bbf6ad17b5656f22bb5e847f442adf7d6

memory/1688-22-0x0000000000690000-0x0000000000B33000-memory.dmp

memory/5096-21-0x0000000000600000-0x0000000000AA3000-memory.dmp

memory/1688-29-0x0000000004AD0000-0x0000000004AD1000-memory.dmp

memory/1688-28-0x0000000004A80000-0x0000000004A81000-memory.dmp

memory/1688-27-0x0000000004A70000-0x0000000004A71000-memory.dmp

memory/1688-26-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

memory/1688-25-0x0000000004A90000-0x0000000004A91000-memory.dmp

memory/1688-24-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

memory/1688-23-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

memory/1688-31-0x0000000004AF0000-0x0000000004AF1000-memory.dmp

memory/1688-30-0x0000000004B00000-0x0000000004B01000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000015001\amert.exe

MD5 721488e115833499dc629df16a830832
SHA1 3bb57d01c8f6b9807cf3f1992ba1305af2626bae
SHA256 2c985cf56c076f1058b4868a6b860845cb8972cd3af3732b54e8c95766c1d581
SHA512 369a8717b9e4ba67e0960538ba43c4b1d8001e7398eb45e03136b2762be0c2a17e5ff3139e9f85604c0169b734187b8309915d935fcff8abeaa6ef80a0a5ed27

memory/4516-49-0x00000000004D0000-0x0000000000986000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000016001\cd78a3544c.exe

MD5 439813a50ba41286e233bbe9e9733165
SHA1 df2aa0501336451a974a8be34229ca65bdfd8567
SHA256 fa51f58a27e76311e2117256eb500ab4a85b4f117b13d4d7b0d0fed5488b11ac
SHA512 5a9aad7d91148c0a96044c31f555f6e520518b210211cd4ef05cc16b668d6c5e8297f1685eb3b1c0ef5c03988b4f9119ebc67cbd7c436b3f7c12952cca85dc25

memory/4516-74-0x00000000004D0000-0x0000000000986000-memory.dmp

\??\pipe\crashpad_2560_QPUOPMRLEWRGHZSH

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\1000017002\db3b2b68f2.exe

MD5 c876f49d727613e509154ebb990094ec
SHA1 1b8892b52dd847ae6f47e980b3e042e0fe67bcb9
SHA256 e2070d56c968170581ec143a875ebcd21aa3de67068dcd53fe2a7abfe8e68d4f
SHA512 b3b4430d529109d066ca3ab732b1cd3877ffab9048e4aa55970518d39d1d8e590c729d47271af91f24892d60cf92586140e928cff1c09a187f7514e6c1019291

memory/1460-116-0x0000000000BE0000-0x00000000011CB000-memory.dmp

memory/1688-139-0x0000000000690000-0x0000000000B33000-memory.dmp

memory/1688-147-0x0000000000690000-0x0000000000B33000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\b5ed8015-ecf3-4f0e-bcac-689445bc10f2.tmp

MD5 4b0795fa041dcedeef1e41d6531dd674
SHA1 f014455a885bd0e5f0f3116ab98c71d7c271a76c
SHA256 cb052d72ade20247a46ca82d5e85a6b641272ed4e42ab52e56fa6eac65bec923
SHA512 9c6ecae056c231428595eccb7d714c91b36fd4a93883d3de0791ee9f7758e3e218fda7bf35ef6c6cd43dea62d8cfdf7a95046c4a098eedcf4964f7b9a121d4b1

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 03a0c8d1593302af36b9c5c734db2923
SHA1 c1b46043889472d74b15a031d97b3809150cf12d
SHA256 b5170cb87da04953070949ef2a624f453f059c53f67bea1be4770cb192ca1340
SHA512 a7e73b1a13c44990b579c1540bc05b621d389d7ad7552d02177a8f14d37da80434416f87123869276dd27116cc5cce4666de89b3034a00dad6a0755128baac18

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 48f68c2d7bacdbc0baba5d1845bc484a
SHA1 da64354f3bea57636e3b8b753f1c003b23062446
SHA256 b1e96ce165b2e41a5a4b6ebaf7f03f41e9ed9fcfb1bec180906b34b5bbc192fe
SHA512 cc3e1a87d1aa9628e662851a81eb336f7877ad229edbbf7516ddf3297bddf9354ac1bdc9bf282ccce4db85f1037c40932c2a22f9e898f3c9e07a4237ea8fb8e8

memory/1460-163-0x0000000000BE0000-0x00000000011CB000-memory.dmp

memory/1688-169-0x0000000000690000-0x0000000000B33000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 a287332c40816f012aef60934297de08
SHA1 74810662dc1248b26320676188ba25cee02ba786
SHA256 26e41d8819373c190e048c0c8d0b6544f235fe9a705fb4ecc6cfeac8ecc5937b
SHA512 3cd362e48afeacb76d64bc4cd637498824b1ae97b8cbef66827ff1a4ae3a7421ccd3ec718d1cb05b4060078d0574488fa492bb5926c8a7e5664a270243cf4c2f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History

MD5 55af87880d4476b9e712259e7a899044
SHA1 1834ad9c4633d48e3d638e34cd6ce59807fe7ddb
SHA256 8b9bb82548a367ccf1133b85475052a94a38744e52af5160bf334e41700015c4
SHA512 c47da6a5edcdc5963429a768478401b0725621d9f551b19569d0855053ecabb1cc3e8f59b5e6ceaea51158becc6a9742d6a53da8d3d742f2677531ea66a8d8b1

C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\XS3ElCi8EpAPWeb Data

MD5 9ac3596c1d5e25667ddeb1d999880ddf
SHA1 d838f60a5360744e8b27d3a848d454b2593e55fe
SHA256 6fa7d6a6c10ee18e1e2f97de06156bd18d909948a9598999f79751493e1bf5bc
SHA512 9335f0b67674b794272ad1b83a75c05bb7a263cd678c050ed25fc23ea417a95eee629325028e1bfe1e6350a0d97dac19431c89ea3abe0927aa53a91671e98b47

C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\hrusTZgOTQitWeb Data

MD5 f70aa3fa04f0536280f872ad17973c3d
SHA1 50a7b889329a92de1b272d0ecf5fce87395d3123
SHA256 8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA512 30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\O14s8JDKgZiai018g0Al.exe

MD5 856e6b78e53ef4beecb6d40ce161a7cb
SHA1 7c92800a4d14f3b19bbd968e94593b93e4ea59a6
SHA256 a525e348f440dff0998a8cb5f27de3d002285401771d603ba5f1b2a6d7e53bcd
SHA512 b464205f2a971a70e02ad5bb11fd23310c8e2a7ae88a7c6c4d3ab5936bdde672f2918db845546fd8361fc5f2de5e751d2b597e0f7ae367185792b672fb36e0c5

memory/668-263-0x0000000000ED0000-0x0000000001374000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\spanrsUU6O70530Q\VGB5K0bTRLLo2atrwdUH.exe

MD5 e999c85e9294c04ca2e012d101d03ab6
SHA1 67031ca3f2905d0c8a799309a7d7f6ad74b3cfa9
SHA256 8bd5f1efb7d469529805d3819ea52f3cc58548f17508973b2cdf7976e7293f22
SHA512 b33457e5f198cea95ea5bbeb2d8b4394b3ce8f669863d982f81b70d432432921b70ac5155d731696658b4ffc5a4b2c9e45cdd335d8e55f7891bac97ff7dab0bd

memory/668-287-0x0000000000ED0000-0x0000000001374000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 ea98e583ad99df195d29aa066204ab56
SHA1 f89398664af0179641aa0138b337097b617cb2db
SHA256 a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512 e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 4f7152bc5a1a715ef481e37d1c791959
SHA1 c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256 704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA512 2e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 b98ed8599ba73dd6e881a55a19963d7b
SHA1 f9069fdcc7928126c4c4e82a6ce84e657035277f
SHA256 9a35f26b34ab2cc94cddee2314f2df47e6ecf4ae45bbd2c223dd12f982cd4795
SHA512 9943f802049883e408026284095fa78ea6d5d1ab9f6559626dcb859e5b0e867b3be495f48079791313a165c742a9d0112f82e137a971e1aa61d2cc194a099a77

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 be8b441250804438906c51f50bb3c4b5
SHA1 a08f8c8f70a3c61454e451c89426e978de411fe3
SHA256 85050afde887adfa76223163e8957aae69f72a77ce4d1d0675aeb785c3e07df6
SHA512 01dc438809c67ab8f91a6c7087a13a06ef44bc909d497bc9b394ae794040056094424d645da9c104d7dddcb926071ed7e681fbbfe5d57862bdd4ccf3a17ef406

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 577010cecc8722b2c5909ac94df833b8
SHA1 497066b06e96b44045429307f5ac07c0a39a37ac
SHA256 30293fe37302f718e9169575acc7fbf4d61837acf8010491e8d259def3eaa061
SHA512 4a785ef8cd12306fdd17d5fed897d38ee4ba3aff8f586aa97be4404b6693260c483ad776dbf69bf6657cae76349ea9976e9a8a4abe7e354bea0b1f6590fbb0e2

memory/1460-373-0x0000000000BE0000-0x00000000011CB000-memory.dmp

memory/6424-375-0x0000000000DA0000-0x000000000138B000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 e47415f0a60721ffccde5d86202e26bc
SHA1 ea8ca472ed09e25056529019402e85404a43c940
SHA256 f0e4bb9f48ce44405dea4e764a9bbf18a7b79cc575438a6eae57485c239daf3f
SHA512 e3e4b9ee8a0946c4abbc0611838a15f14885ab44d620934a927d4a8d7c38b47c0dfdbf5a58a64d15a138d1e8ae2c46819f140a18761f7ca34d2347e729478959

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

MD5 f61f0d4d0f968d5bba39a84c76277e1a
SHA1 aa3693ea140eca418b4b2a30f6a68f6f43b4beb2
SHA256 57147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc
SHA512 6c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

MD5 df28d2e5b943be59cbd1cb7c9d382043
SHA1 546e9a058c33fb3fd8e3d7ae282dfb3a49b3923b
SHA256 9c6e26dace6c541dde04d536d4ae64567f524ed7e2d05a012fb8fa047a10b9ad
SHA512 b6e13946336ba1fbf26dab240aa62f8468417d4971fac367e88dbde40537198f51eb5d8b9e8699027f394a0d36efe5da79c9ad0370924aa73d7fdb9bca5d0731

memory/1460-493-0x0000000000BE0000-0x00000000011CB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\rage131MP.tmp

MD5 f2247c20106af3ca573cb523f13562da
SHA1 01492e0c3c723947f3b70351012e52c51bc75947
SHA256 f94273f728ca6d07d1edbe79452605a4a4d82f883f13323bf81d3daff4d9646e
SHA512 e2af92b414f070a2b3bc68c149352e1352d95f9ce3d473fe0e08e233aeac5a61c16689bb32658c3806f64eb44f92a67d832942800d31599285c42c52dfd602d3

memory/1688-504-0x0000000000690000-0x0000000000B33000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 9a4bc095b9680fa25579508be20c271b
SHA1 0c69defecd06f3e37896c7ab3dbd866be1990276
SHA256 950fb1de4ca1dc2f0c2f048aa757515171f1980d2000d49c11c1fbc996708f44
SHA512 722964716e09ec65298c3899f38b11fee40094ea7a3fd5bc9e944ab153814d6a534a1f250993859c3ed48c01fc99154b0a990b1b6939a8e00b9986201c400de3

memory/6424-547-0x0000000000DA0000-0x000000000138B000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 a7daea437e1e7879aaf8a9228c67f34b
SHA1 c33ae33aa1eb13802007a688eb6960cec7565ede
SHA256 33e98694676cdd6341dd7c6ecbde1f6a9cc36ca92164372666a6be61d7c8e747
SHA512 4aef6a1306ddd49d0cf471e421583e95f6564b87c312db641d9956e5b2f4131e72308d1ee00f8871a194a32511ee76b0cf9b79e9270197102f07fe49ba821d42

memory/6044-555-0x0000000000690000-0x0000000000B33000-memory.dmp

memory/2968-558-0x0000000000C90000-0x0000000001146000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 83c34b5ba26719784ab9787d3d721791
SHA1 7cffc643282f6fc59589ccf51428541fa4c93e35
SHA256 f1f9422ca43664e375d0aa01ae946de0cd550f70708b503aa88b608b58590758
SHA512 3942fc712ffa0620228578f9721f13d62d720e85cb13df930b03c8da6dc15051538a16d82479f4514de42cffe13aba89f1a254a0ec2fc5103bc32ddf30aef17d

memory/6044-571-0x0000000000690000-0x0000000000B33000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000238001\file300un.exe

MD5 cb1fa9b5d0509372c8299742a9a36228
SHA1 bb8e5a0206f8909afbf5b32a1493e686e596c040
SHA256 d09f47363c21f002a615eb6476973cf907eb9c4ab16b1f9aa3909e200665ac45
SHA512 61c74cab5d8928b9cfb53ddc8ba4b0528ba6cddf72b8ae7a866a5c77f27079d3cc2752ab0d533635701c94e2de49c92d600a1d74f734268d535cb53750696826

memory/6084-591-0x0000015F1DC20000-0x0000015F1DC2A000-memory.dmp

memory/1688-592-0x0000000000690000-0x0000000000B33000-memory.dmp

memory/6084-593-0x0000015F38050000-0x0000015F380AC000-memory.dmp

memory/6312-594-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1000239001\mstc.exe

MD5 17eefbaaa30123fa3091add80026aed4
SHA1 8e43d736ea03bd33de5434bda5e20aae121cd218
SHA256 b780f8659c3cfab33ffa95b25b396b2b8ade8bd40c72aaf7c87ad3c6b6cf34c5
SHA512 e82fbbbfef61773fae1ed3e0767efa225ede0327ca5654de25e86359f4366942f85cf5542e67a52b24bb129d7fccf09fc68c64a73cf9269a75040d888005fa09

C:\Users\Admin\Pictures\wYb4WI0bLvOg72o9k5Nyle5N.exe

MD5 5b423612b36cde7f2745455c5dd82577
SHA1 0187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256 e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512 c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

memory/5116-631-0x00000000003F0000-0x0000000000402000-memory.dmp

C:\Users\Admin\Pictures\bK33yNq3aLA3mGt9BSINxRiF.exe

MD5 02abedd1d0aedda2c4ea7a7fabdf9895
SHA1 7e78b92c0ae7e4b575f0824062714ce774bd2bf9
SHA256 d83011dec2bbee77269f3b84f65ab094c77615e6a1f25266f7f7705eb2ce99b5
SHA512 daf5f3a3651e62a74a0bd4e7fd10e9f2a52f83d00285ccae4bb76700b5cc2f3e3a2fad6fd71426d6d4b4521efab3f52ff18f1113beaf0a061c70a5c0db5cae17

C:\Users\Admin\Pictures\z2pkeQRK9WQylMDaVVswDpBX.exe

MD5 a8ecd54b2d45b34014942cd86912b3a2
SHA1 e7353349e276e72091cbd994d238cb0587062ac0
SHA256 782c3160b76c4b72729b86d5821cba12d4f8fd3beaa76eaa828b92cd94796774
SHA512 4f0945a7c918de995766ca4efad9b2d68dd706e2b2e01d15de1e10b79d861d70db5ea70018ee085196e1963855239d9daf662e9facfe242b6dafb85ccf6b9bb1

memory/2564-660-0x0000000002880000-0x00000000028B6000-memory.dmp

memory/3736-661-0x0000000005890000-0x0000000005EB8000-memory.dmp

memory/2564-662-0x0000000004EB0000-0x0000000004ED2000-memory.dmp

memory/2564-664-0x00000000050F0000-0x0000000005156000-memory.dmp

memory/2564-663-0x0000000004F50000-0x0000000004FB6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dt43pjr5.bux.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2564-683-0x00000000058B0000-0x0000000005C04000-memory.dmp

memory/2564-685-0x0000000005F20000-0x0000000005F6C000-memory.dmp

memory/2564-684-0x0000000005E90000-0x0000000005EAE000-memory.dmp

C:\Users\Admin\Pictures\tdifi1Rzp7N58vGj1lRGI2Ex.exe

MD5 28d853922cf07f58ea8f4a81492120ae
SHA1 e957c503b201179bc7901256bf37ff292705e805
SHA256 e62b73e7f0b73dcdcf303dcd3f587a54a684d0ab4c0dd1e90b3a8b39502a9a38
SHA512 35f108ecb6d6c5c328c006303fabba0b44622cc86b5e8b4ea74579e26d3222cd591620674f64d89415c8521a379f6ad7298d63243fdb21671e24796195b2b03a

C:\Users\Admin\AppData\Local\Temp\u5ew.0.exe

MD5 f85ca7da4201921c93b98f6555f3d7b7
SHA1 523891e3e23bb45a52e402b6282f70f9e17cde9c
SHA256 eeaa177b0bc2d85cf8b416c2ed3b85fd50bd7c811bf41a32d161a10a767c2fda
SHA512 1b8220fe954799fbc43a702a1c508beff390c3f5a58e8e50e3c5ccce48459ec3a25df395f041f722cb67b0eb6c31013239f58a8b947e60344d15ce0c56e9cb17

memory/6892-699-0x0000000140000000-0x000000014072B000-memory.dmp

C:\Windows\System32\GroupPolicy\gpt.ini

MD5 8ef9853d1881c5fe4d681bfb31282a01
SHA1 a05609065520e4b4e553784c566430ad9736f19f
SHA256 9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA512 5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

memory/2564-723-0x000000006F710000-0x000000006FA64000-memory.dmp

memory/2564-734-0x0000000007100000-0x00000000071A3000-memory.dmp

memory/2564-733-0x00000000070A0000-0x00000000070BE000-memory.dmp

memory/3736-735-0x000000006F6C0000-0x000000006F70C000-memory.dmp

memory/2564-722-0x000000006F6C0000-0x000000006F70C000-memory.dmp

memory/2564-721-0x0000000007060000-0x0000000007092000-memory.dmp

memory/3736-736-0x000000006F710000-0x000000006FA64000-memory.dmp

memory/2564-747-0x0000000007200000-0x000000000721A000-memory.dmp

memory/2564-746-0x0000000007840000-0x0000000007EBA000-memory.dmp

memory/2564-748-0x0000000007260000-0x000000000726A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\u5ew.1.zip

MD5 78d3ca6355c93c72b494bb6a498bf639
SHA1 2fa4e5df74bfe75c207c881a1b0d3bc1c62c8b0e
SHA256 a1dd547a63b256aa6a16871ed03f8b025226f7617e67b8817a08444df077b001
SHA512 1b2df7bee2514aee7efd3579f5dd33c76b40606d07dba69a34c45747662fad61174db4931bca02b058830107959205e889fee74f8ccc9f6e03f9fd111761f4ea

memory/3736-820-0x0000000007BF0000-0x0000000007C86000-memory.dmp

memory/3736-821-0x0000000007B50000-0x0000000007B61000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\u5ew.2\run.exe

MD5 9fb4770ced09aae3b437c1c6eb6d7334
SHA1 fe54b31b0db8665aa5b22bed147e8295afc88a03
SHA256 a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3
SHA512 140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256

C:\Users\Admin\Pictures\MHJaHYAcg1N5hyyyfZ6DlMGl.exe

MD5 f25dc52cba32b614063576f57f8b6c9f
SHA1 8df5d70a4b1d1792497102e88467e4da7135bedc
SHA256 e55f3ce82f3b1cb2f1f1e69a0fe68db0a0a7721c16d6a6591f9f252d70fd54fc
SHA512 d15830fe2c9308e6e53e036b1624c2ee111bf17f4b5a4d31decd6d5bc6d39dfa5905570d070a198ac15f830f6615848ad4dddcb6ea78d80f0e09327c382fc07a

memory/4548-840-0x000000006EAE0000-0x000000006EC5B000-memory.dmp

memory/4548-843-0x00007FFFD8050000-0x00007FFFD8245000-memory.dmp

memory/3736-849-0x0000000007B80000-0x0000000007B8E000-memory.dmp

memory/5756-857-0x000001C4B1380000-0x000001C4B13A2000-memory.dmp

memory/3736-863-0x0000000007B90000-0x0000000007BA4000-memory.dmp

C:\Users\Admin\Pictures\p5TBe4cxaT5wyUKg2Xb3n6sq.exe

MD5 a63018cc078f57c640ac2ec8ed84dead
SHA1 1f5c17894a755114527e92304f4a74195c48031d
SHA256 41d01d8fc610b6ceb17687c58973ee8f6a7bbdc1eb6deb19297e3f4c4c62b558
SHA512 a42f522745bbe8b36ea60d7688a713bce89df2f7b0f5c7ad7b32bc43989fca71e00d817692263ea4004ad6be23e64dd9d3d2f1dfbe7b5038cf4b79b7064a9864

memory/3736-879-0x0000000007BD0000-0x0000000007BEA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2404272327119137024.dll

MD5 45fe60d943ad11601067bc2840cc01be
SHA1 911d70a6aad7c10b52789c0312c5528556a2d609
SHA256 0715f9558363b04526499fcd6abf0b1946950af0a7f046a25f06b20dddb67add
SHA512 30c82f6b329fefa5f09a5974c36b70ea2bdab273e7d6eadd456fddcc2aa693f8f1cf096d57c3719d1106e9f85d50a4ffbf0ed7e66da2da0a5f23b6ee8c7194ba

C:\Users\Admin\AppData\Local\Temp\u5ew.3.exe

MD5 397926927bca55be4a77839b1c44de6e
SHA1 e10f3434ef3021c399dbba047832f02b3c898dbd
SHA256 4f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512 cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954

memory/3736-892-0x0000000007BC0000-0x0000000007BC8000-memory.dmp

memory/1688-914-0x0000000000690000-0x0000000000B33000-memory.dmp

memory/2968-915-0x0000000000C90000-0x0000000001146000-memory.dmp

memory/7296-916-0x0000000000D30000-0x00000000013A4000-memory.dmp

C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

MD5 f35b671fda2603ec30ace10946f11a90
SHA1 059ad6b06559d4db581b1879e709f32f80850872
SHA256 83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512 b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

memory/7016-935-0x0000000000400000-0x0000000001A3C000-memory.dmp

memory/6636-948-0x0000000000400000-0x0000000001DFB000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 96ce886c9474b2e9d0e3e651de4b570a
SHA1 2b621a59f4e466cb43aab12e154d291783c5c17e
SHA256 97ceb8eac8f43cf9212b4d767ecca665166d52c8e0a59e145d020b28e7cc2dc2
SHA512 c5fbf89e6173ebb2a432f3aab8c2de3bf8c9fd369116c20f6648dd2fa58ddadd1060890b5e59884d0dbb6fb173f7ef48f9c281a485767efae8af30f87a70fc82

memory/4548-990-0x000000006EAE0000-0x000000006EC5B000-memory.dmp

memory/7852-1027-0x00000000067F0000-0x0000000006812000-memory.dmp

memory/7852-1028-0x0000000007900000-0x0000000007EA4000-memory.dmp