Malware Analysis Report

2024-11-30 03:37

Sample ID 240717-vegv5szdkn
Target Epsilon_Classic.zip
SHA256 35c82cfd52b4ceab73e4647412e82cc0a33a0eacdb66c61ba110bbc99a1aa7e5
Tags
epsilon spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral24

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral26

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral30

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral13

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral15

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral16

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral22

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral23

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral25

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral31

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral14

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral19

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral18

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral21

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral20

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral28

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral29

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral17

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral27

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

35c82cfd52b4ceab73e4647412e82cc0a33a0eacdb66c61ba110bbc99a1aa7e5

Threat Level: Known bad

The file Epsilon_Classic.zip was found to be: Known bad.

Malicious Activity Summary

epsilon spyware stealer

Epsilon Stealer

Reads user/profile data of web browsers

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

Looks up external IP address via web service

Unsigned PE

Enumerates physical storage devices

Program crash

Suspicious use of FindShellTrayWindow

Suspicious behavior: EnumeratesProcesses

Suspicious use of SendNotifyMessage

Enumerates processes with tasklist

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Modifies Internet Explorer settings

Modifies system certificate store

Suspicious use of SetWindowsHookEx

Kills process with taskkill

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-17 16:55

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral24

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240708-en

Max time kernel

118s

Max time network

124s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vk_swiftshader.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 756 wrote to memory of 1688 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\WerFault.exe
PID 756 wrote to memory of 1688 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\WerFault.exe
PID 756 wrote to memory of 1688 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\WerFault.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vk_swiftshader.dll,#1

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 756 -s 80

Network

N/A

Files

N/A

Analysis: behavioral26

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240708-en

Max time kernel

120s

Max time network

126s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2360 wrote to memory of 1720 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\WerFault.exe
PID 2360 wrote to memory of 1720 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\WerFault.exe
PID 2360 wrote to memory of 1720 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\WerFault.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2360 -s 88

Network

N/A

Files

N/A

Analysis: behavioral30

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240708-en

Max time kernel

121s

Max time network

125s

Command Line

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\demo\CMakeLists.vbs"

Signatures

N/A

Processes

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\demo\CMakeLists.vbs"

Network

N/A

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240708-en

Max time kernel

117s

Max time network

119s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 220

Network

N/A

Files

N/A

Analysis: behavioral13

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

142s

Max time network

152s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffmpeg.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffmpeg.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 104.193.132.51.in-addr.arpa udp

Files

N/A

Analysis: behavioral15

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

146s

Max time network

155s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libEGL.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libEGL.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 147.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 92.16.208.104.in-addr.arpa udp

Files

N/A

Analysis: behavioral16

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240704-en

Max time kernel

119s

Max time network

124s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1

Signatures

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1748 wrote to memory of 2016 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\WerFault.exe
PID 1748 wrote to memory of 2016 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\WerFault.exe
PID 1748 wrote to memory of 2016 N/A C:\Windows\system32\rundll32.exe C:\Windows\system32\WerFault.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 1748 -s 88

Network

N/A

Files

N/A

Analysis: behavioral22

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240704-en

Max time kernel

6s

Max time network

20s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libGLESv2.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libGLESv2.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral23

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

148s

Max time network

154s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libGLESv2.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libGLESv2.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp

Files

N/A

Analysis: behavioral25

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:59

Platform

win10v2004-20240709-en

Max time kernel

146s

Max time network

155s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vk_swiftshader.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vk_swiftshader.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 147.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 15.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral31

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

93s

Max time network

128s

Command Line

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\demo\CMakeLists.vbs"

Signatures

N/A

Processes

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\demo\CMakeLists.vbs"

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral10

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

146s

Max time network

154s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html

Signatures

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1584 wrote to memory of 1528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 1528 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 3852 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 2292 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 2292 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1584 wrote to memory of 4448 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80cef46f8,0x7ff80cef4708,0x7ff80cef4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2400 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,9187239868000603251,17316011151514407695,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 10fa19df148444a77ceec60cabd2ce21
SHA1 685b599c497668166ede4945d8885d204fd8d70f
SHA256 c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA512 3518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef

\??\pipe\LOCAL\crashpad_1584_LXTZRHMCFEBUPEOK

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 75c9f57baeefeecd6c184627de951c1e
SHA1 52e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256 648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512 c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 0b814fdc59b3fe1dfd56b885eee39256
SHA1 25820e8236ebc23c9ddf8466ea1694efb2d3832f
SHA256 04131d6b31568cbe50fcbc8c0cf52d3288f04cdd9b06743b8f459a3fa785794e
SHA512 43c3ffa9248ea50fcd79ead28bf4fdee2f65d06a32497c25d135fd6058a9bd7cdc89f875b67d4bde9ba4b0885e8141bd793dbaa8f33990e0628da034970392c2

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 f3859d4e49ccfdb885969e4accef3a53
SHA1 5ce8ef696b5e910e38f9d66d43ef34bd67432955
SHA256 04e7f1c1d6853909200c1a2ea770fc694fae80bc2daba87ce1b33a15125ba446
SHA512 89bb26ec875bd333089b737382c89eaf56ad10dee2dde0f7c5183f4be35e8a547b27227e99ab0a4c6cc921e48d0271e1aaa10fe6b680310f435a4d6a76bb8a5b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 79cbcfec8a13c79e11f00d322e3ab04a
SHA1 3f1007d4ad1a65a6bec1090e0e672912c661aa6f
SHA256 415a0b4c2677b8bde0f3cde9091bcca859a534a703bd9e8e9d87bed26ed4ea2a
SHA512 3ae0eeeefd28c679bc288c7865fb4ba75ff966bce93aa1388bf20c7389ce01e95685bd25763febae00d507c4cd56b4a53998aa2c0342a05e53c140c0d4fc387e

Analysis: behavioral12

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:59

Platform

win7-20240705-en

Max time kernel

121s

Max time network

129s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffmpeg.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ffmpeg.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral14

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240708-en

Max time kernel

117s

Max time network

122s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libEGL.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libEGL.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral19

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

146s

Max time network

160s

Command Line

"C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe

"C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral18

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240708-en

Max time kernel

118s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe

"C:\Users\Admin\AppData\Local\Temp\resources\elevate.exe"

Network

N/A

Files

N/A

Analysis: behavioral21

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

142s

Max time network

149s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libEGL.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libEGL.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 20.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

138s

Max time network

140s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4924 wrote to memory of 4864 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4924 wrote to memory of 4864 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4924 wrote to memory of 4864 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4864 -ip 4864

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 620

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 52.111.227.14:443 tcp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

N/A

Analysis: behavioral8

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

150s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe"

Signatures

Epsilon Stealer

stealer epsilon

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Reads user/profile data of web browsers

spyware stealer

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A
N/A N/A C:\Windows\system32\tasklist.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 4312 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 4312 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 2360 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

Processes

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe"

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 --field-trial-handle=1884,i,17992284727472572320,13672210869366554518,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --mojo-platform-channel-handle=2160 --field-trial-handle=1884,i,17992284727472572320,13672210869366554518,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2416 --field-trial-handle=1884,i,17992284727472572320,13672210869366554518,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryla\WinSCP 2\Sessions"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2872 --field-trial-handle=1884,i,17992284727472572320,13672210869366554518,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 ipinfo.io udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 34.117.59.81:443 ipinfo.io tcp
US 8.8.8.8:53 81.59.117.34.in-addr.arpa udp
US 8.8.8.8:53 wdb.life udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 dns.google udp
US 8.8.4.4:443 dns.google tcp
US 8.8.4.4:443 dns.google tcp
US 8.8.8.8:53 4.4.8.8.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 209.143.182.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\3963f822-a766-4622-a880-bf3d7b2186ee.tmp.node

MD5 ab4a1c882f829aaeb65be643caa4e88a
SHA1 a5ebfe571aa30feae9ff52cbf18f7b0ae3cccb12
SHA256 9e29441fc2b83a9f2457f7e4e4c829970883b34a891533228c85fdff3e703db8
SHA512 548055c6eaddaf2aa66abc53ede4e311aa942d2d33ee6bf47e694e32b4c54bde73322f5d88b3192fde4f9226f265dd0d156573b2434ace8af5d6e36af182a880

memory/1060-6-0x00007FFCDDDA0000-0x00007FFCDDDA1000-memory.dmp

memory/3672-26-0x00007FFCDE840000-0x00007FFCDE841000-memory.dmp

memory/3672-25-0x00007FFCDDB60000-0x00007FFCDDB61000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.exc

MD5 f3b25701fe362ec84616a93a45ce9998
SHA1 d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256 b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA512 98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

C:\Users\Admin\AppData\Local\Temp\10816747-aa19-47a9-9aa7-b9089463181e.tmp.node

MD5 083fd9f2e3e93e1f2c599a2b609c9e5e
SHA1 6db2b6ce3e60d828ca32a6000c270c09224f3139
SHA256 5800c926c34c7ef38a45840c30e8855c1b3a6ec1ec8f37ffc6ce2d402728eabd
SHA512 08206b13d7e91f36d65de545b483d5fa446c2a1d8baab4c2fb19aa711af10cbfd98da3811d34a16033b5c09eb297fdcfaf09a186b4dcf69e84bb4dfcc11d96b2

C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Autofill Data\All Autofill Data.txt

MD5 dec2be4f1ec3592cea668aa279e7cc9b
SHA1 327cf8ab0c895e10674e00ea7f437784bb11d718
SHA256 753b99d2b4e8c58bfd10995d0c2c19255fe9c8f53703bb27d1b6f76f1f4e83cc
SHA512 81728e3d31b72905b3a09c79d1e307c4e8e79d436fcfe7560a8046b46ca4ae994fdfaeb1bc2328e35f418b8128f2e7239289e84350e142146df9cde86b20bb66

memory/3672-112-0x000002141BA20000-0x000002141BACD000-memory.dmp

C:\Users\Admin\AppData\Roaming\EpsilonClassic\Network\Network Persistent State

MD5 0157796824da1e3e67078937e4ff3d19
SHA1 b233d24a6de6e3b1f94cfa8c101c9296b10c9915
SHA256 b0551afe82304f318f9a2fb3bfe47975677ee4d79dd3be91d54694a42612b6ca
SHA512 13c3e953349159a0feb58240727ec8532977266d39977612d84f762caf999b85db5fb7d49d4eec83818c77b9a3eaf94e3c043effa512cbe10d52b05be0cb95aa

C:\Users\Admin\AppData\Roaming\EpsilonClassic\Network\Network Persistent State~RFe58c119.TMP

MD5 2800881c775077e1c4b6e06bf4676de4
SHA1 2873631068c8b3b9495638c865915be822442c8b
SHA256 226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512 e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

memory/3196-136-0x0000018C4C330000-0x0000018C4C331000-memory.dmp

memory/3196-135-0x0000018C4C330000-0x0000018C4C331000-memory.dmp

memory/3196-134-0x0000018C4C330000-0x0000018C4C331000-memory.dmp

memory/3196-140-0x0000018C4C330000-0x0000018C4C331000-memory.dmp

memory/3196-141-0x0000018C4C330000-0x0000018C4C331000-memory.dmp

memory/3196-146-0x0000018C4C330000-0x0000018C4C331000-memory.dmp

memory/3196-145-0x0000018C4C330000-0x0000018C4C331000-memory.dmp

memory/3196-144-0x0000018C4C330000-0x0000018C4C331000-memory.dmp

memory/3196-143-0x0000018C4C330000-0x0000018C4C331000-memory.dmp

memory/3196-142-0x0000018C4C330000-0x0000018C4C331000-memory.dmp

Analysis: behavioral20

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240705-en

Max time kernel

119s

Max time network

124s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libEGL.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\swiftshader\libEGL.dll,#1

Network

N/A

Files

N/A

Analysis: behavioral11

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

148s

Max time network

155s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3dcompiler_47.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\d3dcompiler_47.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

N/A

Analysis: behavioral28

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240704-en

Max time kernel

117s

Max time network

121s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 220

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

146s

Max time network

153s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4592 wrote to memory of 1272 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4592 wrote to memory of 1272 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 4592 wrote to memory of 1272 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1272 -ip 1272

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 628

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 21.53.126.40.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 215.143.182.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral9

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240704-en

Max time kernel

71s

Max time network

146s

Command Line

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html

Signatures

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000cc56216e23985b851d4f8762a971bd6940a38e249ce1e2ab197290ee620dce0e000000000e8000000002000020000000c0d47e46f86e3adc25b6352fc84a9adbb25905d24d7ea1bc23138dc3d90bc033200000004bc02e7babbeacf35b03538945bbb0a9d806ce94c75e73498722d32347a37fac4000000082cda1dc0aa51e4a0311680fa5d1da5343966bd821eb505fc9f8e255de3e7d1edda6ab49834bffd5ed3581cd2cde4f3d0f35f283908f5f95e311e7d9b9166378 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{768D6D11-445D-11EF-960D-6A8D92A4B8D0} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427397237" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8014134d6ad8da01 C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Processes

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\Cab5CC3.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar5D91.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1e40c6cae9f6e771bc0c94d860d141eb
SHA1 78fbcc914da086baec0a2ee07d1e98bef54280b4
SHA256 41bd909b164cabb7d3802d38e51be87485f36baeee5c4b42857cc1089767c3e7
SHA512 a1f0f9acebf67aeb2dbede15ab555d7492f11acc90d28fe1f3a7afb61498f5d3f264bfff944ad1df4a4131056a58d5c35d58795ce43e112feb01f5c832f67e19

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e3def4b407256c9b77a478a4b73b3dcd
SHA1 28e0144e43e6f2707615746b72642704159bb960
SHA256 cbbd435d33044414de644b1e9886cf7663daf60922319532c7efd04eb1d3f9a4
SHA512 73fe8744df840d6ec88d2d441b8028ce91d9598c6c9404dde81351e7a82a59b185069cf4065d44e0c738d22cbc31cd805c759dedc7445c3a6fe3ad12751f9cb5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0c4446cb41d74b626559ad268391e576
SHA1 189bd96f298a6b17caaa5b696c4bda641d1bde4b
SHA256 0f70f955a20d1d94b810f808a89852243893f8d03a433e6aa4f76757c2c41041
SHA512 9b66014d7306b2854aae342e79c511c7f2c179c7ef29b949db750277d8c93ffc58493d52351e4502c4d6868a17ddcd415b94dee2cbc91d7d5477b41e7628d37e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7a8651a375134c479e44369421983022
SHA1 08d60352302595d909f45686824eeb3c01c4ade9
SHA256 0bcce2ada03e7821818bbba26281e531b4ca477cf788efb5c1f4d71ae3dcc895
SHA512 daaa01a458d8e60753d8c9f1375add6929b303d2b3d03dccf10ecd7804761b28c548420ef174e82536d7eba684017e2f6228a55cdcf6bfeaf28a8286e135904b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 32165d6443be1277a93eb42a2c00ef0e
SHA1 09b498b0df6e3fe26b4a8f7b1a77e65b59ebad6f
SHA256 97c714dce4dd92dcc3df9e692dd26bf41ca74735ed823aa13859ff13afe21232
SHA512 156c9d61e7b98dea0b084b4711519afd1d9954280483b853067e2bd3e72c2aff24a01addaf519eca379a0b76869068f5f14802e9da6533b40c15f94da9161099

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e48334e5118a4e7b8087f8b9a80fe43b
SHA1 81d10d0f8fabd1ae343f12e15afc355b58fc4d8c
SHA256 42a60afab2fd6e42f99e3b941941b1dde100f18434044b3c05078471acd8faf0
SHA512 50a9de9a7870273b00d29b731b74c7263abfba6fa94314f7d61b5cf133ca12058f17710d8ebb71ac16cdc8f1f8f448faa05e7fed8da5572e5b47a171396538b0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3604d883c7ed012262faf11389d3271c
SHA1 4c7ff5abab0603008d128116e5913f4e68ceaecd
SHA256 4991bab8fc4ee52496bc80a6f3b503a0833bf019ef4f55c420be3c94b331a001
SHA512 0503a31d4f862baae528a4524d8b861b64059f0438f9e20a10d4035c60b24b3520c0b762573c2488c7df184b1fcd6f1cde986bbe5b2ea275ae0f18788f9b853f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7baae0e9d07003950d038730c8d0dc78
SHA1 b38b9760098c040cba7648aa5224a091cbf46d2f
SHA256 95cb0149c7937ba70d0d65e8e475654525f95142fab08a0824c93b9376220ad6
SHA512 38f18f6291c2ff79c8f1832d93bc719afbb0960a196a690ebeadb6065af34b344d761954558b0e39c00e425513deaa4a25ca59e2f7462dd73447099cafecf0d1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8ff4031f8deda1a78da5e9ac15bf1336
SHA1 3d24b51e8b96c5e651ed099c117cf7f8a14f6b49
SHA256 bb170ba8152e48ce3316571a9c9f6f1089e56bb10e7d941b1f892a97d32b04ec
SHA512 061109fc63821894cac79c0fcd8ef609001a8d7ad54aba69ba904c17388b8425b288af3cafa734cb024389eb4e506fe878015bbfb62545a6ba829d19de88129a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0ec636f3cfc8f878079fae5bf4abd2a9
SHA1 be3eefcc0f53214025a4ddbe81f16b060786f885
SHA256 02f3539e044441984f6dc4acb77aa3f583d284eb27924c62263887d4978cb7f3
SHA512 c59623c2cf2e47f0d1364a072fc02b7cc5fa7d36bdf6890ac57c9bf7d8bfb97457bd46ee383c3276655a9c4fc469e704b3f479654cb8115705e48138c7107572

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 3e92445fdfe04a7d12c0b1d5390dd27e
SHA1 6050a6894b0520b1273aef72c310586ab40945c2
SHA256 3e04bbf92e2eaf2e97c3d9840454d654dc40969fc92c38530043ce62c91ca2b6
SHA512 cccfd5fe9d84fead96cc71c5d50f407ca4b7919d61935aa165bbd2c24036f76c27c62c605021c8b8ae9454d83b647f7d1299d9b17fe01a28067c1e6623ccfeab

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 86a7cc6cf692778517cf5089c9e16347
SHA1 ca797fbd52cad05bdeb395cbf37529447f9327ad
SHA256 a0acb32339489d766eee48cf821b6371facfe553c9b4594c576ed0231c823372
SHA512 b65844671c8cb6e149b75cbcd7cb213270d80a657cc0f964804aa265907683270dc41c1db22bcdf1256373d86b440b2d78edd26c1e3c08429b40a368b95494bd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 60a77e09f56fefcb3569abdc23f02d6f
SHA1 4891c4185d060be3d338ee6aa480c651203bc5d1
SHA256 1d119a682ec6fc3aae5784d81132a36d4dd9f709d481a82613cb78cab0c1e51e
SHA512 a88e42e5a7d910bc3321cf42869de9e2ec440fd638f3728481a9e5ff32e3eb5f4650e3400ca6c6f34b4ecd5231ed59d7a59d072dc1541e47906c1ac38b2409b0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2b9a0693b916222188cd917454ad5f38
SHA1 14da6d3b7eab5a26cffe4daf421691e00c801e6a
SHA256 f5db28e9b9292397953bc1e9c623f8b494526fee2e9c8b319a358ac31dc7db07
SHA512 8ac34a55bf411ec2530505ecb2a83bdcf1ee2a8152bb26cb289ef9103671c6aebe5ad4bfecc9346df45e7792832f4db532ec08b4c55531c775690195c366f68d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 91b0433b1e4959866591befcc3fa21c5
SHA1 531bebac02e22a3965ef9a99f85f5c0aa02ed91b
SHA256 5d037257e30599f87e0960b6b928468f3ecda92a65504eff699d89c0b120bdfc
SHA512 cfedb7e80ea409437fb69676b979388d8d8977095c3b231c987b725e79c97008b97c4513a1e06a7be54e45732a91cc3b1c34fa321dcfc6cd4d5995927ce5f597

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2eff5384bf489b412b90bd4d6432b195
SHA1 9658a36bb34bdbfdb13f0983a09e93c29643479c
SHA256 cbc849ed7d52f640ff1f669822f0f2379d700b33f7f71569ca01f66c0aaabb5e
SHA512 1d2fe376cc12f5c2484cbbe6bede631cf662f6fcc71aab4be65154478e0c340e499b072ae1ae396d3fcce3c720d3b6c99e61706b949275ef2adbde8596b99a25

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 5207b7cae335cbb4e258fe78bfc2a414
SHA1 80c610ab440759acc6c1532cc912eda41066812b
SHA256 6b432ebf5a77ca11dad997f43e561e26abc0ed77d7d6b0557e655fbeecd3af5a
SHA512 efbcb6b6fc4bba60d24545c0840d8277823f1acc68f782f8cc16f2c5a55d9f061c5af861a2cc95261378d0d849e0978bb8686d992d3f11bf9be789cce30b8e14

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 be6ada0153edc4b3405526a5b8539557
SHA1 43ff2434b3687fb14ca3b18222e9586fd09c5ff6
SHA256 2617d61bf14431f445f66d8240932342cfe10209110dc614d146e89799ad0aad
SHA512 05e822a047a5a87040be6d8d14c81b362c5e10d26b3129f0d7be8b709a86f3753de2c632b09427436553ff713ec3e9c86ab3a2d2e0cef01266314889ff93d599

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 43fa68a7f596ce9d5d1148eece5abbb0
SHA1 045ad963195e122b84d5b23cc785e6aec1f61e3a
SHA256 d6e774ba56749da7c2a0884acec357f5cb6024f6a569a9fdee2d7dac29934f75
SHA512 ac6574af398556fa588e34cede2c320cb8ab83739964ae6951cda0e7e0906699f395ff5899df2cd3ddf7a194eb758116aa0573a60f3d7c5790cd547fd5b52274

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c6c1f007bb60bc413fe3d30c1eacfbe6
SHA1 67558b61297c93a34749981e33df7152a9b2a7db
SHA256 a7176d0c82d397ed7914fe362723c3dc81f16d3842edaab3ecc6f98899a37039
SHA512 580afca37453bc9792f87a01bb3bbcd53af6c8bb764509729087a114f8d691c54707aa5efb784c5f07cb4b8d18ac4e27cc66a02217c6d9ec0a27b993bad445fe

Analysis: behavioral29

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

142s

Max time network

125s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1

Signatures

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\rundll32.exe

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 368 wrote to memory of 4572 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 368 wrote to memory of 4572 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
PID 368 wrote to memory of 4572 N/A C:\Windows\system32\rundll32.exe C:\Windows\SysWOW64\rundll32.exe

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsis7z.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4572 -ip 4572

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 620

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

150s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe"

Signatures

Epsilon Stealer

stealer epsilon

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A

Reads user/profile data of web browsers

spyware stealer

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A

Enumerates physical storage devices

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A
N/A N/A C:\Windows\system32\tasklist.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a0f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b9992367f000000010000000c000000300a06082b060105050703097a000000010000000c000000300a06082b060105050703097e00000001000000080000000000042beb77d501030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c190000000100000010000000a823b4a20180beb460cab955c24d7e21200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1812 wrote to memory of 3380 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 1812 wrote to memory of 3380 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 2444 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 880 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 3380 wrote to memory of 3432 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

Processes

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe"

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1900,i,3807400735179910584,3801791444295042163,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --mojo-platform-channel-handle=2136 --field-trial-handle=1900,i,3807400735179910584,3801791444295042163,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --app-path="C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2464 --field-trial-handle=1900,i,3807400735179910584,3801791444295042163,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM chrome.exe /F"

C:\Windows\system32\taskkill.exe

taskkill /IM chrome.exe /F

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryla\WinSCP 2\Sessions"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2780 --field-trial-handle=1900,i,3807400735179910584,3801791444295042163,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.59.81:443 ipinfo.io tcp
US 8.8.8.8:53 81.59.117.34.in-addr.arpa udp
US 8.8.8.8:53 wdb.life udp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:443 dns.google tcp
US 8.8.8.8:443 dns.google tcp
US 8.8.8.8:443 dns.google tcp
US 8.8.8.8:443 dns.google tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 52.111.227.13:443 tcp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\System.dll

MD5 0d7ad4f45dc6f5aa87f606d0331c6901
SHA1 48df0911f0484cbe2a8cdd5362140b63c41ee457
SHA256 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512 c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\nsis7z.dll

MD5 80e44ce4895304c6a3a831310fbf8cd0
SHA1 36bd49ae21c460be5753a904b4501f1abca53508
SHA256 b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512 c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\chrome_100_percent.pak

MD5 237ca1be894f5e09fd1ccb934229c33b
SHA1 f0dfcf6db1481315054efb690df282ffe53e9fa1
SHA256 f14362449e2a7c940c095eda9c41aad5f1e0b1a1b21d1dc911558291c0c36dd2
SHA512 1e52782db4a397e27ce92412192e4de6d7398effaf8c7acabc9c06a317c2f69ee5c35da1070eb94020ed89779344b957edb6b40f871b8a15f969ef787fbb2bca

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\chrome_200_percent.pak

MD5 7059af03603f93898f66981feb737064
SHA1 668e41a728d2295a455e5e0f0a8d2fee1781c538
SHA256 04d699cfc36565fa9c06206ba1c0c51474612c8fe481c6fd1807197dc70661e6
SHA512 435329d58b56607a2097d82644be932c60727be4ae95bc2bcf10b747b7658918073319dfa1386b514d84090304a95fcf19d56827c4b196e4d348745565441544

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\d3dcompiler_47.dll

MD5 7641e39b7da4077084d2afe7c31032e0
SHA1 2256644f69435ff2fee76deb04d918083960d1eb
SHA256 44422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47
SHA512 8010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\ffmpeg.dll

MD5 6b7a55ba33677da910b905b54477e208
SHA1 97dec80bff4749c95bfd1a4836cfbbbf59f85b9e
SHA256 4abbed23bb74732b021b31ea3881efeb94af14d00d98a8c795359acf8d72b3ec
SHA512 ce29287ddb792820725f113e128407bcf21703af5b4561078ab6a22330e902f24dcf30c8ebd1809148b984506f66702ff3fb4a3c68a6eff55b163c563b8fe46a

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\libEGL.dll

MD5 f9c78478b8d166faabc7e0fcb9d7058b
SHA1 f44f4038d5dd3741cb650036dcb2d0c0eb2f4e5a
SHA256 02206307397bb252efcdbe0792c85183fd04b225b1efa986d7636297fbef3205
SHA512 25aa385d2d51de282e9a1c53222633546acbddc4cb85bf3792434cbd88867ff0d0722aff94948a8b6a63c7a29c3e56f7a85e734351d39de5b723eae0e75ad7e1

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\LICENSE.electron.txt

MD5 4d42118d35941e0f664dddbd83f633c5
SHA1 2b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA256 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA512 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\LICENSES.chromium.html

MD5 dfa12f4edccb902d7d3b07fae219f176
SHA1 c2073440a5add265b4143de05e6864fed2c3b840
SHA256 501f0b7ebf0be7ed8702d317332a0f8820af837c0a2a1d7645ba04352270e2b8
SHA512 eee3a8e0eeae139ddd9369d0869c29c91007bf6c5b0d7982918d5a013214a9e80b9233e7c1ccb43124152f684f0b782831b0a6b3d126558261dd161230004e50

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\libGLESv2.dll

MD5 c803659d06897fdead1048873590d8ec
SHA1 6ec313dce8672a7f8851da6a3a460e08237c3f6d
SHA256 d1cdb910bb1d7c59611eec613c1d12414dfc4b69013daeff6d9e0b9ac10f5f60
SHA512 013ed30b6fda93d058b7844a41f4849679d869c73976f04bcc4fd3bec043610c98726d12e288a40fa30d7834bcf8e25dc621eaf0cf36453b0c6ae4360c307fd1

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\icudtl.dat

MD5 d866d68e4a3eae8cdbfd5fc7a9967d20
SHA1 42a5033597e4be36ccfa16d19890049ba0e25a56
SHA256 c61704cc9cf5797bf32301a2b3312158af3fe86eadc913d937031cf594760c2d
SHA512 4cc04e708b9c3d854147b097e44ff795f956b8a714ab61ddd5434119ade768eb4da4b28938a9477e4cb0d63106cce09fd1ec86f33af1c864f4ea599f8d999b97

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\resources.pak

MD5 ff31c1a39edc8202e052a41fb977a300
SHA1 f220ed82575e346c2fb086c0868c07318d57ef92
SHA256 965dcddcb984a231fb2356d6d7ff4e047c2d8fa527442fa64981ab5d254525c9
SHA512 3b3370dd630fd200969331ae7d9b7e005cfbc3aa41ad128274bdc7797de2eca89998787a90a96baecf25ffc64e2c764cb75051efbac57c679abfd17b47873cce

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\snapshot_blob.bin

MD5 d161708b7dfcbdb2c3162ce8971d4b06
SHA1 395c2208d72ec0fcdf5f086ee5c599d5ed26fc57
SHA256 4806bcbd9b11dad6f2e7a5a8c38411da628c5a17fc4fa008d203f96e9d5b49e0
SHA512 d84fec656d3a5a2af22ad1fbedb5912230a8650680ef43b69a802abcdfea4931753abade2a406128618d04872ba2ac056e9f73da76275987d0fe6639b060ca24

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\v8_context_snapshot.bin

MD5 a7ca4f63aad12693225e8fce2d205917
SHA1 c75ed0758459153cd013d4ad75aacbcda7188dd0
SHA256 ca150395b8284b9e9ee5f672354fe7324fd48a62e16a8cc0ab30fa1e52c0fef8
SHA512 820be9193cb459e95df0b5d773bd584a35b6a19c205fe03f312e02da243326d93f73a09258ed438a15d959d82f547983ad459924588b8210b266ab4ad8d3d8ff

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\vk_swiftshader_icd.json

MD5 8642dd3a87e2de6e991fae08458e302b
SHA1 9c06735c31cec00600fd763a92f8112d085bd12a
SHA256 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512 f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\vk_swiftshader.dll

MD5 a016e6074199673ca94105958a6959b1
SHA1 a72d55e3dfc28e845c430f627095e8f496bc13d8
SHA256 11502332052b730ee985c3f0aed8dd38eccc068030d61b6bf69660b954d86f2b
SHA512 f31b8b467f16de980981abc751d1c283cc63a9adfc8e103f69f92422d623eac441f47435bc4dc9f595c7c5b5b7b66ebd58018617d92b14ede6bbf0408aef2c17

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\vulkan-1.dll

MD5 4794c60a34d5bfc6e6d65d6d0cfb575b
SHA1 e8a5925ddde1f300927d0b474b8741161a433701
SHA256 79601e7917850f7fde72b2f2785cd0daacd2fe68aa0cfb4050dd01988794e5e1
SHA512 6bb94d7e1362884291099bd6370e7eebad47d2b60bc18cbe597afe02f8bec350c043a03c13eb64adf291c2a993b18a37a637758f1385736ae772467259ecdebf

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\bg.pak

MD5 6673c15b24452ed317a2143fac853ea2
SHA1 121543fdc1374e072068b939f89a8ef07839ad94
SHA256 99fee30e8f3dc7c66eee4f7a4b08d385ca5cc3e076d18dec4bd83ad4693643a6
SHA512 b4b3fa8982b2954be2252ef26e7984aa80a1cef26ab3e1ef4fe93ee3649a292d6ab8bcb48afec6bd741bc9847f9d1ac249ee39e27612318720b38a50d28fa779

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\ca.pak

MD5 22f24a5207df73e810596cac96a08c4f
SHA1 0788734189803356fdce9e96242e81c5f76416f9
SHA256 1432bad4cc1b1fa4787aea2fff4b6d54e9722e8433659e2c763a02352b945841
SHA512 51b76a9af885030faf62b1f340b124ef900be93e4072cb4c67badb394936a91e85e3f9793690548d7159a68ec48c4b3a96c6b01a46a509426583dae7e815bb4f

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\bn.pak

MD5 ea97de9bb34a0cf0874c57b06a06f668
SHA1 cb96a96cb7fe8883efdbe91e23f726f64b9dddce
SHA256 19d583a41faed6cd22ae5f2dc3e4e345a007ca6a85f85301842dcfa9bff25da4
SHA512 d7a369f418b4167f0331806427bf658c3e49fbed5196ba2ce7e1363e32c157e651a2da7e5a50ba06be4bd1efc7503377abefb0a02498dc95385d194e1bbb4796

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\cs.pak

MD5 fcd85a24ad96b0e3ed1454e1b8729bb8
SHA1 df1d2dd77bc9a90e580d73d3efc4c794483780d5
SHA256 60b495222c37a0d56ab5ff08cf0db75ce229b54d5c36c029dca63b17bbe9985d
SHA512 990fe2bf940152326d931c67f6a9e366ade1d4ea018ec18e09bf92d678364898b1f549b9d89343079224aa8243d96b51b94b85b879303210eb47769625b34ddb

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\el.pak

MD5 b1da4ad2fead83209fa74cfc013b5497
SHA1 81e1a7a79abd0a0cb8f7b45cba305b40b3212a68
SHA256 ea33d6496dc71fdf3ec3ca61728f74063b9c81b726abdc32a19fa37299ac7e6a
SHA512 9ef3c13464d73b405dcea13d6e8be27b3361abe4b0435f76a2704ebc5e6a18a1741220e713b76625727b926e26dfff2bbd7225cf1da9cc427f80672b21679911

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\de.pak

MD5 a2f76deb231427db252713b1d370a2c2
SHA1 e15c9245e8f1a50d1ed0d7aa61bf22bf9e668d37
SHA256 d853202c9d590fa88ff7c2adc57917ca01e829b4f87d803d3be6a0dbc09d3af6
SHA512 67a293c5109ba729cc7833b08aabf5e464e54ac65e286137d228c76c407e81b733a01f5be6cb770c57bad539e7a0807fde7abf880004cda8b497a882e07753a8

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\da.pak

MD5 f5679c4866af2cea4cd087567f52288d
SHA1 e2ff7d761a7c343d18b30cdfcff996d016f45a59
SHA256 7bd576c9d4f55c75d05d259ea7a0ea70a4440bffd4a9e0873e85a7eaf3f5e93b
SHA512 4b5be9f78992fea3377d507973fb1da79fd2af7a22025ff029fdb48aa4b47136c937ce2d07e29973aa95f6c18ac3b985956deae142a573761231e85bcfba5794

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\ar.pak

MD5 a1924e7f237e038bc916feb9365ff3fe
SHA1 78f0d15b14602de1bc82660f3c02151a4ea32f4a
SHA256 faf5d56309aaa2576214371f4a55360c2bafe2eb6674d0fb72f2a1dc3aae93b1
SHA512 300dc8e3d35a11cde5be9c137279fa2236e5311ab72be6cc6e393210ff23d635b565497db5dd0e26205d92d2afdb85c3bd41600973b2ed95e5b5893ddc406b65

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\am.pak

MD5 cea549409055b1c6fe04c6932740e94f
SHA1 fdc6f84f97d506e5620c9ae4cdcb6f857ddac3dc
SHA256 fab95a53ea884bcdd304acf6771e6ad77c2ed0b3d019ca78d3313f9665e64420
SHA512 6c4efb2cf1c58329077fb045b3da6929c82eb3e3a52ec90131c95e63c4ffe54e92e0db8d787dc74573cd1c0cb07b487d83a6a98ff703ffbed9dc28b806ac5d57

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\en-US.pak

MD5 88b9e849c0035cb100d031fa5e3fa0b4
SHA1 3576e0fa589e53ae36d2b75937bd3c5c0ab8dbfc
SHA256 25462802f57f52581d34d67df00f7a4d62cb5ee5ee0e5e853f48ad9caf04dd89
SHA512 99e8cf196cd9098adf74f569d06043809454860f8f3de9e942f3ce3c2faeeaa3d6bd0572503cb6c2a6b932aff9aa7e4542501731693ec6a015cc7282af388e8b

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\en-GB.pak

MD5 75127302ac25474709f4d4d9d003d1fa
SHA1 dc3e4ff6240c6fa27d0ba2cf4e75efd05c4bd4ef
SHA256 c4874d32ae74029a6d9b244aa939200ba56acbf80e142f70a4b4fbdb61a36bac
SHA512 5ef0369b633f6bc4d75b660d772ec2ba69310ffd2068a734d9e2a8cf3a75c61e198dcdbc9ad32eeecf7aaa66d0eff03e1bfe3aa22e5ae438cad3002897ff2c0a

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\es-419.pak

MD5 5164eb594b97a7b6a7399ead0baf4d79
SHA1 f3d30ba7bd66474ddf9adc903f5a6b8e18e5f3ee
SHA256 a069e8d14a8b442368d5eebd169cf43dd622e9763316328a7abf0825a1a26a49
SHA512 40f2752aa8986019f3a660bfee0f107eb6ee37e7b646e0881ce26469b5422dc5f1c7187b0057f73e6469ea9c42944870ea720f6570375b6de13a8cb486660ff2

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\fi.pak

MD5 6cc8910e96378d3f752352a4c6ded107
SHA1 5f2af2eaa37dd1205df6b32a24b20cad8020dc88
SHA256 b5a8c4f72727485cce72c86c6b590f8305424bff35a05bccf25f7ef3227ecea9
SHA512 4878c4c97c88fc1faf1857507c830b90f15cb367a20fb575edbde12d2372b69012d5e367d6cb0ffe23976cabc4fa3f010ca8782a04b99961bfac85393ab0c0e0

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\fa.pak

MD5 824bacafd8c6f795f2d400dd805d6017
SHA1 e4881822df1a6de69dce56980288a48fda428148
SHA256 2dd63e6c428cecd9f90880fd65cacb53844b3f8fa8b993a573db5f97487f1e17
SHA512 a91fd86b01210033772f52f06926d45a0f70cc40aae291b6871410f03e2f54e4df06f8e5ac9faeb1c506bd302462e872bc0d6dc5f8190c522cf4118ea6521fc4

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\et.pak

MD5 ef768cdc54fa927a463d4ba8e24d51a0
SHA1 3acb64231a36ea8b53d03eeabb0ae49ca1c95c56
SHA256 b66c92e01924e6af935e58a8697e290f2faff38d27185bbff4e51f305ad8c01a
SHA512 cb5d438de0c44c0487ff5ded35f10980ae28709f5961966c13300b54c2367a034660f37fd93a30e61d5f30970c1d38338ec6ec76b7c01efc819c54d2e87ffdef

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\es.pak

MD5 e9b6d88c4a56b81aa136fbbafc818bbf
SHA1 ff6f24ce4375ec4f8438bcc8ce620853fcaa099a
SHA256 07ebba3ca9248b15ba39c0cc48aec98a19b4a8f70850ac8cdbdefc4312f36dd7
SHA512 33a0687fbdd916036dcfdb0685b145066846f6c90e880452291c62ac6699e957fae54e75ab9e6106a63d03d19b2ab425dfa337617b0107433ccdb7df9382c94b

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\fil.pak

MD5 b69fee960d82bbaa106a28fd7847e904
SHA1 b8e4aff8de27dad6b605574318955fbf32a87139
SHA256 044104a8f2e54418b2f8fe44132ea6406b2043495564172895d2c748f2261fed
SHA512 af10eef2531a03e4767b54a0541b7501fef247ead879cc70238369aaa9749f7cbe30c3e6d79876f9f6b8b24bad58feea7b92b817db3948c9832b20052e6b4a1a

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\hi.pak

MD5 0863745aa43ca822811fded0f6672252
SHA1 7567366db5f6d2b6ec8c37050d746e3d0158d8cd
SHA256 bfa56fbe708a02e7cfd9bdad4b379947d5ffb753576a2261a4ff953e18a22df6
SHA512 ef9aff00132c8281a5f1c8252b460dc674128b9fb5ce772549eb758b89bb91702b2b6a9d40b698b5adc317bf22219d6d40f32e87d66b8a960b5c5b57d67a36ac

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\he.pak

MD5 0b2b2b04c523d987846149f3e138196b
SHA1 22ba09f94641601ecd4ec89a5ec90b02685b5e08
SHA256 844a490d1b58f3e1a997ade643f1a42460b46f3d9cfbef60f53a70e5a4051ed9
SHA512 b3911693feb70b5e95c53f573f53d191ead5006abff89fc5a9557652f2b93b995dbf37e396ae6a55f2b87d365393c9869dc3ca6e1c98c9d8804bceb21816fa64

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\gu.pak

MD5 9dc1ad986a7f03cc5a4dce34acf8098c
SHA1 34eaa6f57016264460f12912d195704e285a81f5
SHA256 4ed43b7f782a81a478777464788a65ebc939e4b6995ec25e612b222ae9884d77
SHA512 8d63b39fbecd148b4e156ebd1e1bf6ef07e00cdbbfbff80b5e7a86f8e1b9a69c64b6d7e6dc88232aa8c59cfbde72de3cf567da140bef026747c1ee86fc7d6e80

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\fr.pak

MD5 0d35752e733c3298903804a248797ed0
SHA1 bfccc581ddfa348b4a58e17336c6f3abff5ca3d9
SHA256 627965026500d609c51b1d1abe858711b547272ea6ec0141c3fafff73145f6db
SHA512 2c6f37306551b9d36165a08633ef8eac91bba19764ee180a78111371993ccd69e38cf8edb07bc86a43ceb15e1c605685973783a5cdb960c6e4208900ba0c176c

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\hr.pak

MD5 ae8fe3c5c3c3faa12aec04b44048f69f
SHA1 0a69e11d095c8ee8aea5aed21d4ec919bf20eb1c
SHA256 98e02706c2de8deed2b1e1d18ef2f75fb53c18e78a077275d0c266ab30d5a013
SHA512 2bd62bba86f04efc7929d0c5656efe71344d6dc7839fc12a04c2931e7e7f83795aa925b204d02e2509511b491a0b3f793ffc093f8ef0d7c91cf660ecfb0b8f1c

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\hu.pak

MD5 f4c0de0a17f3e6a53f221bfff4aa64a7
SHA1 e82e59ecd1cea48f82c97b2dd5ba87dc6f13251a
SHA256 32fb888b7396b23a399cc8b8b58fadc8a7c04e8ca417f8f8772061803529f470
SHA512 171a3ecd205aeb1479664761dfca6bd450c471a7137296f1164df0c3641a94ff4d3fe326deb7e8ab6998eb6df49b1b5f8443ecbdf8b4b2f70dbfaafd9922e164

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\id.pak

MD5 bdccf52de61554dcac07536c2b43edc6
SHA1 0cf291ed2cf2c9c8bde04e3f59d4863b42e10322
SHA256 a4773647c12cf7facf511be5ad583c95d1ac020e6d02f8a5d048c85d15839f99
SHA512 ebe085d899dad8d4fe481ba9ab4251d46415214c0721c9a3c0bc0b52db88f207e5933c2f6650c8b0449edc980202561dac860843d71b1262142d262d2c919d15

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\it.pak

MD5 e26c1a2291cef617cf0aec36abb997cf
SHA1 d4ce53b6b9e3df6df1a33a38858370175e516c55
SHA256 73e8392b4a6e09b2227d8e9f465f509f01cdb1e5b3d29bfc52172c91920d7968
SHA512 8c64f93561171271f9be15da291970bd66f64c7f0be913f7a10a864cabc78e6eb886c7ace5dd2e0d0eca05259cf78c4fda2370aa609964415f7733ffe1fc578f

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\ja.pak

MD5 98782b0343b4ada9cdfc60334ce88ff1
SHA1 66a435246e77c6c9656cb42dcb8aa1d02dbd1422
SHA256 cda16813348def319c043e7bfaaa7c058e53bbc242ad8954eded5391e4888cd8
SHA512 8ab500cf2ba2dab91f99eb895e32174eadd8dc90bdaba5fdeaaa54e05a6b3f3240e0008eb59324e1f017759678a41c9306547c61da5c5536126bd379bda1c577

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\kn.pak

MD5 bdce88966fe4ffee45221d5d2413d171
SHA1 04122d06f89edc801749f890aaa1fbf6c9e42b9c
SHA256 f4e907450416b3f49f4f59b523b146e9e72f0c080e19fa69a5372046c3b2264a
SHA512 150fca4214ab93a924cc42aacf0752113180175d8e06f36d40a87eb9d5a30ed1a80ee1f838a6decfac5caf64515371017f56ed9fef0bf4a32f6cb9838aa64a1d

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\ko.pak

MD5 1523e71c4c5ada7819ad2c809434db30
SHA1 12ced5e9929c2a6ecff7c3f5cf0f909be9907607
SHA256 ed41ce8258b607b7a1e4ed5942d6ae577c8a09ae88ca39f3832986ee9849c7a1
SHA512 21767eb766eb9a53e4d4455cce013df09d8a9977c41e9224140af706656c15626e6911d15f5b1649bdfabb13b50cebedc4a38ee2585699792fd015031984da3d

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\lt.pak

MD5 beb38be1aa9d196441a6fc4f1744e343
SHA1 da27c0c086e321efc4ea09f4034c8c97a08bbc44
SHA256 3a45701cea56a304d035cac52f948e892a7433454ef0b7835d59cc2705d449a5
SHA512 0a6f573bcdb787a6dc8b8aa900fdc28e685bb83a6f737ee03fdd4c81cc6e3ccc48237d700d287b257911783179291ac690f0634272eca6a4c51dc5e819415f6c

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\lv.pak

MD5 0860a9f3eb0201e7071472acde08c691
SHA1 3d7ab60739423f75f0d6e2060df41b2ed4d003d9
SHA256 a1293552b0efa2c954e029ea21281b3cd8e5e57b466a02c5ed75ae4b6764ee8b
SHA512 9a51d0f60c6a072466a2ef955f6dba674f8646e1d6ddd3df1ee6200352dfd7c9976ee532d9143c22b749f715ef70940ac266612f4339bfc70a4aa46475c785c7

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\ml.pak

MD5 7c2168a0cf1d62ddba6c3fb03bac6837
SHA1 27a3bac23de7833a1d6b1ea7f5abae8c9507b000
SHA256 5e467e46484985e96d830d1532ac9bded252fed551a3f4adae62b2ee57d7ede8
SHA512 fca43c8c8ea82d0c197d21ae0c32203e3657a1c2876bb3822a42f42ad5edf4040ada8594e70a2fbe840f16b656855a67d5fad09b445ec2f95eab02dbc5c6e3c2

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\mr.pak

MD5 2042ac8a4a716c6a4f16e1f93ab55a74
SHA1 6b0be2d4dfba73f951642d0fd665641fa66d18e0
SHA256 6a7141f6b5fc4de5c0fb7cef0515cc5031286901096f3536c50566a55e696835
SHA512 8e2bca475204ace4d619261de6c4dd6050d8d4e180dd93f8c9e6ce06083400c0cad2d81beb710524b70b8a3e09543a574a8b0bed3d9a043b8e1b1fcb491cbee3

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\ms.pak

MD5 e106a771fd9e8b96f00e7ddc782e3f6a
SHA1 f7c54a73abeb4b889d28ffc38e6bc9af82672a56
SHA256 978c2b302913c3f6c17db27486153b264b6678401927a08be2d60a73647c94bb
SHA512 c3aa94abc00acce6ab89dffc7405d0dc4153cfb9be0e2e6b3ebfeac5964c96437bde93949385527541f7ccb8498025830013e1f222325f84858423da1576fddf

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\nb.pak

MD5 906145785a21bfc4b3bba5092e894059
SHA1 c61757f0bfeabdf35af9eb822b9179be273255b9
SHA256 fcdbde0a8858167fecf295584bef157f779e68f925ff16750101f6ce7323d9d0
SHA512 5646be486f245145f9ba8a65e2047addad251757031021c2c969c36c70e98b86e1d20b1406bde1d95112988ced6601e4ecc6a62866177463137d08f5cc95df58

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\nl.pak

MD5 8c737198948340f9a0a977d99c41d24b
SHA1 c12316fdf16fc495c62d20cda097bd7e1784454a
SHA256 8299aebf4705d087a6df4d37bd42bd40d633ff3f016050df0c55b797cd6e76b5
SHA512 75cd261ef148e580476ee6bd126c02c022f045bbac5ab5790460f208bba46eeb0f2346f2c3fca1848852bdb02ce42c96d852b20008b809c5a23e584e8d65fd7c

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\pl.pak

MD5 dcbc17b60531458cfe5aa8565b8f8e97
SHA1 11c81de7e89889c98703e79d4d4e7a5bb0f586bd
SHA256 774e4828ef7f93ca68d69cda6acc15232f82bf188e4d7bd82bf568b4983d7e53
SHA512 bf61bd84e413d08495bcc6951d2816052fd26eaae2ac64b4ccf7514745c6d2c0f1cc6efa2e3eca5abe25edb9a7172987f226d6520ff0a35fbf2d26d82568441d

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\pt-BR.pak

MD5 b797b8f9602d258a842878c11d7ace89
SHA1 e1a12c75ef8f146cd7cd4120f715034b3fe7fefb
SHA256 5130bd0067df0c536a4134acb966d062150fa9f9e8d464540f366812ddfa726a
SHA512 8e977ee649eec0b0d9e0c94e02221233f6373ee61087f2e940d92349c5778031154ebdf45e0be996c7c9129d3987d540c8dd2c13f23a0433dfbbcd9044cee7ab

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\pt-PT.pak

MD5 4609853e0e58f3b5a8d421ebb7d75246
SHA1 e6bc5d2a688a8bb1e6a3fc14a26be8343dad680e
SHA256 28e09b59a01763e3d4c4f37e4187185d1fc9abc045ed4dc49b5a8bc59b4c31de
SHA512 4ec1cf920b40f5b44f5d6094fbc302f53c7958391b2ab556f190216896a951ccee4d1dd8a222063c02612e48b2d065dcfc7de4eab69c9436846e09146917b8d7

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\sk.pak

MD5 ba66aed3e696befd6c603087d87facf7
SHA1 dab2c2a8e3f0b0a2ee061d9910c09b5d54424e25
SHA256 7e0626ca0ca3d510d828f20ea8f7e63bd56db7a37300138b2a2d8e2c22eb9637
SHA512 23e24d29d0c8e64531fbdce558293244465e4239f5fe1618d038968fba6692bfeeee36b434f3d71252a9c767948db11a83b939edff0b82e5794a65501ed38022

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\ru.pak

MD5 a953b6e38d0e545575b842fd46292755
SHA1 17e15c48ef172375b6d7f26a16ad0332ecf85c84
SHA256 81d1befb25506720d1f336b18a586250ef1c4b389f58eb573784a0ab585f92d3
SHA512 b227f9ab64f0c22080708ffc4ffbba51cf022ee37a1ce9cd82dd06dd58ad12292d6a274badf8f1f27e5f42dcc5b9523e3fee254c02abd1d0844be61a3a713634

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\ro.pak

MD5 cc458834bfa5b085f7482fa2ab6b9791
SHA1 80644bc45b83e06e12d619381276f7d5ffda0d0f
SHA256 26fbb88be9aa8c4f53b541f717a76da6f86083180fd8b4b62c33e595f3b95690
SHA512 56e1ee74d89e3c0011f782dff6d6f5035aa58591946b480a27705568fff6be0e522d5cdee7a953c58e0547be5dc53d624be32399dccc50b1417788f0491e7035

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\sw.pak

MD5 1e4d039a17b2ec681fb139196cbcc40e
SHA1 19e3a3d8915e4e46fe3e816f891bd4fde46d8a13
SHA256 5fe75c17a678a1c131ac6aa5d676e5f5f6dd55e73f25640a219229a299ed86e4
SHA512 7a1c298994b7f346612f4ada2034b3c858d2761e92a284f0ff9431be536a4e481bbf17ed93c007213630d25bac7dea09ee6fb186433bffa773e5daa52253468b

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\sv.pak

MD5 5910a1db798d96122e25e109fabd46ea
SHA1 3af5207b731bb32b8b267693e658cf4f42b05050
SHA256 efb573a199353ac899928e896771c867d0d5047a90abe8efd03cc53a275a08d9
SHA512 b2b06e69c5f38923770cf3f71e632090282bb85c434e49b091742de49082e910e9146b2b1bf019e73f178795f4e736a4fd9764629ab7dc3dd2903985da2dae78

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\sr.pak

MD5 fe305dfcac5d6126c94124f183842fe8
SHA1 e5362a293acb534ff293ad002bbbdff1300ed25a
SHA256 a8daa930b1ede6d93e774314a47d1301302a25e275f09f2cfe798315d66f702b
SHA512 90e5d3057e6cfdd4d92c1f4c8fa0953c4acc52789780b52e43a0f195950423e6d167c5022be0362fdc00ca663c9969d2ae41290f8ff76510fd902afe9a17ee31

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\sl.pak

MD5 5eba56efe389fc26bba76f674874d638
SHA1 81ad6b0a0c29bac657b81a89c34e13c780679af7
SHA256 75830c187e5145c1bccbb00a443cd209db7c3d06f13165568e26a32aad6b98f6
SHA512 acceefbf953172f42e1321db5d23dff38b5aecde242b85d40d22efe631454b6aa609c05628ef97e8f58412287aceda2b5fb045fd6c8b41bf0525570c324afdac

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\ta.pak

MD5 5a63a23068b3e5258f691bdc23795474
SHA1 475631325ad4a22d7e25460f0682f3befe17df62
SHA256 8e7eccc9cbfd3985f3721aa8911b4edb9142d0fe49eb9114febfded112115b92
SHA512 9fd02c6c29c82bf33aef045d2ae717a0006b436d75b379e6af6e58a938a669a2892452759e7d74423ae19dd53194ed419befa82f19eaa5191bff0f6e9d062cba

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\te.pak

MD5 8e751cef31655c77feead2fdf3186cc0
SHA1 760dc42013105a282d0fd960849852c031128b63
SHA256 e90c0e5f1727238898b77017bdd46c89d1d504dc2e0ad0a9d8e73a48e6d2fdc6
SHA512 dc49008af0200159371a3550613b8d7b90391169add9f6fb69005eb4bfd2363a82585507075034d835bdb65fb9f750a009a18dab589209f34b1f8e1374d8d01b

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\th.pak

MD5 349fadf44982eac1e125653267f0b4c1
SHA1 661ee5255bcffa375d07c20cfa76fe91dd88a636
SHA256 d2608a61e3012fc164550c2b8ded70d91a00ed8103beaae8a90ab73d49ebb161
SHA512 00de83a3a695d055c5170b16b2e1934c6af703db3918281d7c31a06d55811a75e0d5f9429709ddfef316a31dfc555cf4be62796f42541cbed790af6c9d10f344

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\tr.pak

MD5 6da36fda3f4593b1ed342a2980c2399a
SHA1 750d1d5fe8a1d310384356953111c7f01174c1f8
SHA256 58f245cdaea7c3cc6059bd21ee9f587760f30b67009c1b7a7307ba6cb5266207
SHA512 540615903e04061fcd2fd52933e2e01e09841dd2d72829dd6b69a97dae24c97d38d0503c378512660bf28363a3d716aa2c5393148d7fcdc6dfc9ae387506110c

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\uk.pak

MD5 f9f596ad161cd6e71b643125654e2084
SHA1 33c54c089c54fbea7028f57a9c7f1518168c8f5d
SHA256 1f50dc81b3af9abc27f16cb3ccdce9c4a84599c24525513a58782c3cc47f2923
SHA512 afbf7916f0aac94de8618d9daaf64d7daebcb4907a605925885a3ff74eb460b47a46e3deaeaaa60edbc9307679e4be0c0ffd9233a0b49d2e169fefe1090cba38

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\vi.pak

MD5 d1b4e2df08f78618ac8f86bc3a1f22c7
SHA1 52c7ab6c76e457bdf0ec82a09286ec7daac938a0
SHA256 6b877979f74f99269c4a6ec9c6c063a9cc39ee89a40346fd0d71c1fc8972b46e
SHA512 e5cefa79c299f81b2bbb6b97321afa926501556ab4e49ff24cfb8fdf835ab807de8d034c1cab7657d5735d1c4159153a217b2aa045c0be316163aee77132bfd4

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\zh-CN.pak

MD5 b457fc9721b9e8dc42d79faf9664f291
SHA1 179784da74cf0ffc4c27aeef076b36bc24f31d78
SHA256 01cda9e14d58f50d637f1fd6060c3cacab4e9f8562eb348079111e3e1fface2c
SHA512 71d698689b7b93bf1b32e915205d92919a0af64452c613e6678048db717a112be883cc89a85e06698bc5e62eaf2a47d4de629724584a5dcb19443d3c870a7695

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\locales\zh-TW.pak

MD5 3d65c602fd24a760819c285d09e724ea
SHA1 361009e3ba4bfb9150c2857a94c9653a4110b68e
SHA256 84dcbb01d9c7a10bc917e03dd71a308b26f3039fa9396920a1879e7b5729e6ff
SHA512 0527313c7afd7334ba5a3e38d939742290eccd913f623dfb116663a4a3463b3e19efdac8cfcc58ec60bf6dcef9bc22ee90e57bafbe6d9a8ac02d5dfe15ee642d

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\resources\app.asar

MD5 cc651f6f556413f41cfe12204698fd48
SHA1 71a1f0989a7c8dd0265423a8c6d80aecb4ab63fa
SHA256 e78e9b3e906bf04f16a41758bd76f7d28a4c5280a03fed5aa203cc634bc95027
SHA512 c14e60d0a9c870c1e3010437fbf9178e5c71c882f1fa5c1bbcd39bfb67cba1eca1dc773b0b5c46873fa5dc61f3d2d184dd5c78b9b9502cc365364111407b979e

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\resources\elevate.exe

MD5 792b92c8ad13c46f27c7ced0810694df
SHA1 d8d449b92de20a57df722df46435ba4553ecc802
SHA256 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37
SHA512 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\swiftshader\libEGL.dll

MD5 8fc5c3b6c2d12869896b391ce9047ecb
SHA1 9568df98d3cd12b5110bcd9879bb1ac71a2cc4df
SHA256 6d24ef2dd27e80f898e5e3569db01229b94336641944c9456daebd8f3991cff3
SHA512 c892330be8d3d720821de77a5fe510b8f61588e7cb64bc3359b1150168db1ccb6de108289819cb338bf6d3bc75d38747481f0f31de5a8c1566b9b18ef0821908

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\7z-out\swiftshader\libGLESv2.dll

MD5 60f7a0f3ffdf96df5c861d3c9f964961
SHA1 6d903ba1057def4958d78be1e8d0a637b3c6874a
SHA256 bb055375ebafcc890d4a86af3609d74b2836b6770af28570c531f2ee28db6bd2
SHA512 f9fd54490a73b4609c2ca9982dfa7d3931c7df840e1bc3571ebf7568cb2784b8eb395ffa0ae395fbe8f3f8cb4bbc6820d3bdc3cce734c8623ea089d2b2483ed7

C:\Users\Admin\AppData\Local\Temp\nsnB298.tmp\StdUtils.dll

MD5 c6a6e03f77c313b267498515488c5740
SHA1 3d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256 b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA512 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

C:\Users\Admin\AppData\Local\Temp\8ef22c2c-e006-4544-9ff5-77fb17ae9235.tmp.node

MD5 ab4a1c882f829aaeb65be643caa4e88a
SHA1 a5ebfe571aa30feae9ff52cbf18f7b0ae3cccb12
SHA256 9e29441fc2b83a9f2457f7e4e4c829970883b34a891533228c85fdff3e703db8
SHA512 548055c6eaddaf2aa66abc53ede4e311aa942d2d33ee6bf47e694e32b4c54bde73322f5d88b3192fde4f9226f265dd0d156573b2434ace8af5d6e36af182a880

memory/2444-546-0x00007FFA3BAF0000-0x00007FFA3BAF1000-memory.dmp

memory/3432-581-0x00007FFA3B990000-0x00007FFA3B991000-memory.dmp

memory/3432-580-0x00007FFA3BCB0000-0x00007FFA3BCB1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\158a85a2-dfea-4007-8a01-a44459085309.tmp.node

MD5 083fd9f2e3e93e1f2c599a2b609c9e5e
SHA1 6db2b6ce3e60d828ca32a6000c270c09224f3139
SHA256 5800c926c34c7ef38a45840c30e8855c1b3a6ec1ec8f37ffc6ce2d402728eabd
SHA512 08206b13d7e91f36d65de545b483d5fa446c2a1d8baab4c2fb19aa711af10cbfd98da3811d34a16033b5c09eb297fdcfaf09a186b4dcf69e84bb4dfcc11d96b2

C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Autofill Data\All Autofill Data.txt

MD5 dec2be4f1ec3592cea668aa279e7cc9b
SHA1 327cf8ab0c895e10674e00ea7f437784bb11d718
SHA256 753b99d2b4e8c58bfd10995d0c2c19255fe9c8f53703bb27d1b6f76f1f4e83cc
SHA512 81728e3d31b72905b3a09c79d1e307c4e8e79d436fcfe7560a8046b46ca4ae994fdfaeb1bc2328e35f418b8128f2e7239289e84350e142146df9cde86b20bb66

C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

MD5 f3b25701fe362ec84616a93a45ce9998
SHA1 d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256 b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA512 98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

memory/2444-665-0x0000025DEC2B0000-0x0000025DEC3DA000-memory.dmp

C:\Users\Admin\AppData\Roaming\EpsilonClassic\Network\Network Persistent State

MD5 f666d7c51ae17b09b28d6ce690b26d16
SHA1 1ee202cc77adac6d361f4773c47db0564b23d991
SHA256 38efb5918d89fbb59202cbf7424d7720f75eed630793b4234a1c4b80ec07cd05
SHA512 841f0709ad242a4f6a96fca0246afec6a9098acf41f9da35bab9566cf49d91f73c98cbee1a0cef0720ea3125a6251436a8cd337e0bd5cc967d8cf8246d8fc996

C:\Users\Admin\AppData\Roaming\EpsilonClassic\Network\Network Persistent State~RFe5905c3.TMP

MD5 2800881c775077e1c4b6e06bf4676de4
SHA1 2873631068c8b3b9495638c865915be822442c8b
SHA256 226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512 e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

memory/2136-691-0x00000236C9120000-0x00000236C9121000-memory.dmp

memory/2136-693-0x00000236C9120000-0x00000236C9121000-memory.dmp

memory/2136-692-0x00000236C9120000-0x00000236C9121000-memory.dmp

memory/2136-697-0x00000236C9120000-0x00000236C9121000-memory.dmp

memory/2136-698-0x00000236C9120000-0x00000236C9121000-memory.dmp

memory/2136-703-0x00000236C9120000-0x00000236C9121000-memory.dmp

memory/2136-702-0x00000236C9120000-0x00000236C9121000-memory.dmp

memory/2136-701-0x00000236C9120000-0x00000236C9121000-memory.dmp

memory/2136-700-0x00000236C9120000-0x00000236C9121000-memory.dmp

memory/2136-699-0x00000236C9120000-0x00000236C9121000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240705-en

Max time kernel

121s

Max time network

124s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1

Signatures

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1

C:\Windows\SysWOW64\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StdUtils.dll,#1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 220

Network

N/A

Files

N/A

Analysis: behavioral7

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240705-en

Max time kernel

150s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe"

Signatures

Epsilon Stealer

stealer epsilon

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Reads user/profile data of web browsers

spyware stealer

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A
N/A N/A C:\Windows\system32\tasklist.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2540 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe
PID 1540 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

Processes

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe"

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1192,i,15309720261026751227,13066986740390779511,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --mojo-platform-channel-handle=1420 --field-trial-handle=1192,i,15309720261026751227,13066986740390779511,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1640 --field-trial-handle=1192,i,15309720261026751227,13066986740390779511,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryla\WinSCP 2\Sessions"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1212 --field-trial-handle=1192,i,15309720261026751227,13066986740390779511,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 ipinfo.io udp
US 34.117.59.81:443 ipinfo.io tcp
US 8.8.8.8:53 redirector.gvt1.com udp
GB 142.250.200.14:443 redirector.gvt1.com tcp
US 8.8.8.8:53 wdb.life udp
US 8.8.8.8:53 r3---sn-aigzrnse.gvt1.com udp
GB 74.125.168.200:443 r3---sn-aigzrnse.gvt1.com udp
GB 74.125.168.200:443 r3---sn-aigzrnse.gvt1.com tcp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:53 dns.google udp
US 8.8.4.4:443 dns.google tcp
US 8.8.4.4:443 dns.google tcp

Files

\Users\Admin\AppData\Local\Temp\dd0b9281-cf47-4838-8e9e-f15f27077e63.tmp.node

MD5 ab4a1c882f829aaeb65be643caa4e88a
SHA1 a5ebfe571aa30feae9ff52cbf18f7b0ae3cccb12
SHA256 9e29441fc2b83a9f2457f7e4e4c829970883b34a891533228c85fdff3e703db8
SHA512 548055c6eaddaf2aa66abc53ede4e311aa942d2d33ee6bf47e694e32b4c54bde73322f5d88b3192fde4f9226f265dd0d156573b2434ace8af5d6e36af182a880

memory/2540-5-0x0000000000060000-0x0000000000061000-memory.dmp

memory/2540-35-0x0000000077600000-0x0000000077601000-memory.dmp

C:\Users\Admin\AppData\Roaming\EpsilonClassic\Local Storage\leveldb\CURRENT~RFf78c246.TMP

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

\Users\Admin\AppData\Local\Temp\37db3139-1ba4-4390-aab3-ec43a0ae6e16.tmp.node

MD5 083fd9f2e3e93e1f2c599a2b609c9e5e
SHA1 6db2b6ce3e60d828ca32a6000c270c09224f3139
SHA256 5800c926c34c7ef38a45840c30e8855c1b3a6ec1ec8f37ffc6ce2d402728eabd
SHA512 08206b13d7e91f36d65de545b483d5fa446c2a1d8baab4c2fb19aa711af10cbfd98da3811d34a16033b5c09eb297fdcfaf09a186b4dcf69e84bb4dfcc11d96b2

C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Autofill Data\All Autofill Data.txt

MD5 dec2be4f1ec3592cea668aa279e7cc9b
SHA1 327cf8ab0c895e10674e00ea7f437784bb11d718
SHA256 753b99d2b4e8c58bfd10995d0c2c19255fe9c8f53703bb27d1b6f76f1f4e83cc
SHA512 81728e3d31b72905b3a09c79d1e307c4e8e79d436fcfe7560a8046b46ca4ae994fdfaeb1bc2328e35f418b8128f2e7239289e84350e142146df9cde86b20bb66

Analysis: behavioral17

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

148s

Max time network

154s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\libGLESv2.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 147.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 52.111.227.14:443 tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 79.239.69.13.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win7-20240705-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe"

Signatures

Epsilon Stealer

stealer epsilon

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A

Reads user/profile data of web browsers

spyware stealer

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A

Enumerates physical storage devices

Enumerates processes with tasklist

Description Indicator Process Target
N/A N/A C:\Windows\system32\tasklist.exe N/A
N/A N/A C:\Windows\system32\tasklist.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1656 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 1656 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 1656 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 1656 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe
PID 2812 wrote to memory of 1540 N/A C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

Processes

C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\EpsilonClassic.exe"

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1108 --field-trial-handle=1268,i,6877770903892039030,17091538892426466819,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --mojo-platform-channel-handle=1428 --field-trial-handle=1268,i,6877770903892039030,17091538892426466819,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --app-path="C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1640 --field-trial-handle=1268,i,6877770903892039030,17091538892426466819,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1

C:\Windows\system32\reg.exe

C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryla\WinSCP 2\Sessions"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 --field-trial-handle=1268,i,6877770903892039030,17091538892426466819,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe

"C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\EpsilonClassic.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\EpsilonClassic" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1412 --field-trial-handle=1268,i,6877770903892039030,17091538892426466819,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 ipinfo.io udp
US 34.117.59.81:443 ipinfo.io tcp
US 8.8.8.8:53 wdb.life udp
US 8.8.8.8:53 redirector.gvt1.com udp
GB 142.250.200.14:443 redirector.gvt1.com tcp
US 8.8.8.8:53 r3---sn-aigzrnse.gvt1.com udp
GB 74.125.168.200:443 r3---sn-aigzrnse.gvt1.com udp
GB 74.125.168.200:443 r3---sn-aigzrnse.gvt1.com tcp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:443 dns.google tcp
US 8.8.8.8:443 dns.google tcp

Files

\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\System.dll

MD5 0d7ad4f45dc6f5aa87f606d0331c6901
SHA1 48df0911f0484cbe2a8cdd5362140b63c41ee457
SHA256 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512 c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\nsis7z.dll

MD5 80e44ce4895304c6a3a831310fbf8cd0
SHA1 36bd49ae21c460be5753a904b4501f1abca53508
SHA256 b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512 c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\chrome_200_percent.pak

MD5 7059af03603f93898f66981feb737064
SHA1 668e41a728d2295a455e5e0f0a8d2fee1781c538
SHA256 04d699cfc36565fa9c06206ba1c0c51474612c8fe481c6fd1807197dc70661e6
SHA512 435329d58b56607a2097d82644be932c60727be4ae95bc2bcf10b747b7658918073319dfa1386b514d84090304a95fcf19d56827c4b196e4d348745565441544

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\chrome_100_percent.pak

MD5 237ca1be894f5e09fd1ccb934229c33b
SHA1 f0dfcf6db1481315054efb690df282ffe53e9fa1
SHA256 f14362449e2a7c940c095eda9c41aad5f1e0b1a1b21d1dc911558291c0c36dd2
SHA512 1e52782db4a397e27ce92412192e4de6d7398effaf8c7acabc9c06a317c2f69ee5c35da1070eb94020ed89779344b957edb6b40f871b8a15f969ef787fbb2bca

C:\Users\Admin\AppData\Local\Temp\2Xb4a8w0DzoUFC0h5SEzSkG3f6R\d3dcompiler_47.dll

MD5 7641e39b7da4077084d2afe7c31032e0
SHA1 2256644f69435ff2fee76deb04d918083960d1eb
SHA256 44422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47
SHA512 8010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\ffmpeg.dll

MD5 6b7a55ba33677da910b905b54477e208
SHA1 97dec80bff4749c95bfd1a4836cfbbbf59f85b9e
SHA256 4abbed23bb74732b021b31ea3881efeb94af14d00d98a8c795359acf8d72b3ec
SHA512 ce29287ddb792820725f113e128407bcf21703af5b4561078ab6a22330e902f24dcf30c8ebd1809148b984506f66702ff3fb4a3c68a6eff55b163c563b8fe46a

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\libEGL.dll

MD5 f9c78478b8d166faabc7e0fcb9d7058b
SHA1 f44f4038d5dd3741cb650036dcb2d0c0eb2f4e5a
SHA256 02206307397bb252efcdbe0792c85183fd04b225b1efa986d7636297fbef3205
SHA512 25aa385d2d51de282e9a1c53222633546acbddc4cb85bf3792434cbd88867ff0d0722aff94948a8b6a63c7a29c3e56f7a85e734351d39de5b723eae0e75ad7e1

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\LICENSE.electron.txt

MD5 4d42118d35941e0f664dddbd83f633c5
SHA1 2b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA256 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA512 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\v8_context_snapshot.bin

MD5 a7ca4f63aad12693225e8fce2d205917
SHA1 c75ed0758459153cd013d4ad75aacbcda7188dd0
SHA256 ca150395b8284b9e9ee5f672354fe7324fd48a62e16a8cc0ab30fa1e52c0fef8
SHA512 820be9193cb459e95df0b5d773bd584a35b6a19c205fe03f312e02da243326d93f73a09258ed438a15d959d82f547983ad459924588b8210b266ab4ad8d3d8ff

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\vk_swiftshader_icd.json

MD5 8642dd3a87e2de6e991fae08458e302b
SHA1 9c06735c31cec00600fd763a92f8112d085bd12a
SHA256 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512 f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\vulkan-1.dll

MD5 4794c60a34d5bfc6e6d65d6d0cfb575b
SHA1 e8a5925ddde1f300927d0b474b8741161a433701
SHA256 79601e7917850f7fde72b2f2785cd0daacd2fe68aa0cfb4050dd01988794e5e1
SHA512 6bb94d7e1362884291099bd6370e7eebad47d2b60bc18cbe597afe02f8bec350c043a03c13eb64adf291c2a993b18a37a637758f1385736ae772467259ecdebf

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\vk_swiftshader.dll

MD5 a016e6074199673ca94105958a6959b1
SHA1 a72d55e3dfc28e845c430f627095e8f496bc13d8
SHA256 11502332052b730ee985c3f0aed8dd38eccc068030d61b6bf69660b954d86f2b
SHA512 f31b8b467f16de980981abc751d1c283cc63a9adfc8e103f69f92422d623eac441f47435bc4dc9f595c7c5b5b7b66ebd58018617d92b14ede6bbf0408aef2c17

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\snapshot_blob.bin

MD5 d161708b7dfcbdb2c3162ce8971d4b06
SHA1 395c2208d72ec0fcdf5f086ee5c599d5ed26fc57
SHA256 4806bcbd9b11dad6f2e7a5a8c38411da628c5a17fc4fa008d203f96e9d5b49e0
SHA512 d84fec656d3a5a2af22ad1fbedb5912230a8650680ef43b69a802abcdfea4931753abade2a406128618d04872ba2ac056e9f73da76275987d0fe6639b060ca24

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\bn.pak

MD5 ea97de9bb34a0cf0874c57b06a06f668
SHA1 cb96a96cb7fe8883efdbe91e23f726f64b9dddce
SHA256 19d583a41faed6cd22ae5f2dc3e4e345a007ca6a85f85301842dcfa9bff25da4
SHA512 d7a369f418b4167f0331806427bf658c3e49fbed5196ba2ce7e1363e32c157e651a2da7e5a50ba06be4bd1efc7503377abefb0a02498dc95385d194e1bbb4796

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\da.pak

MD5 f5679c4866af2cea4cd087567f52288d
SHA1 e2ff7d761a7c343d18b30cdfcff996d016f45a59
SHA256 7bd576c9d4f55c75d05d259ea7a0ea70a4440bffd4a9e0873e85a7eaf3f5e93b
SHA512 4b5be9f78992fea3377d507973fb1da79fd2af7a22025ff029fdb48aa4b47136c937ce2d07e29973aa95f6c18ac3b985956deae142a573761231e85bcfba5794

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\es.pak

MD5 e9b6d88c4a56b81aa136fbbafc818bbf
SHA1 ff6f24ce4375ec4f8438bcc8ce620853fcaa099a
SHA256 07ebba3ca9248b15ba39c0cc48aec98a19b4a8f70850ac8cdbdefc4312f36dd7
SHA512 33a0687fbdd916036dcfdb0685b145066846f6c90e880452291c62ac6699e957fae54e75ab9e6106a63d03d19b2ab425dfa337617b0107433ccdb7df9382c94b

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\he.pak

MD5 0b2b2b04c523d987846149f3e138196b
SHA1 22ba09f94641601ecd4ec89a5ec90b02685b5e08
SHA256 844a490d1b58f3e1a997ade643f1a42460b46f3d9cfbef60f53a70e5a4051ed9
SHA512 b3911693feb70b5e95c53f573f53d191ead5006abff89fc5a9557652f2b93b995dbf37e396ae6a55f2b87d365393c9869dc3ca6e1c98c9d8804bceb21816fa64

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\lt.pak

MD5 beb38be1aa9d196441a6fc4f1744e343
SHA1 da27c0c086e321efc4ea09f4034c8c97a08bbc44
SHA256 3a45701cea56a304d035cac52f948e892a7433454ef0b7835d59cc2705d449a5
SHA512 0a6f573bcdb787a6dc8b8aa900fdc28e685bb83a6f737ee03fdd4c81cc6e3ccc48237d700d287b257911783179291ac690f0634272eca6a4c51dc5e819415f6c

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\ru.pak

MD5 a953b6e38d0e545575b842fd46292755
SHA1 17e15c48ef172375b6d7f26a16ad0332ecf85c84
SHA256 81d1befb25506720d1f336b18a586250ef1c4b389f58eb573784a0ab585f92d3
SHA512 b227f9ab64f0c22080708ffc4ffbba51cf022ee37a1ce9cd82dd06dd58ad12292d6a274badf8f1f27e5f42dcc5b9523e3fee254c02abd1d0844be61a3a713634

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\vi.pak

MD5 d1b4e2df08f78618ac8f86bc3a1f22c7
SHA1 52c7ab6c76e457bdf0ec82a09286ec7daac938a0
SHA256 6b877979f74f99269c4a6ec9c6c063a9cc39ee89a40346fd0d71c1fc8972b46e
SHA512 e5cefa79c299f81b2bbb6b97321afa926501556ab4e49ff24cfb8fdf835ab807de8d034c1cab7657d5735d1c4159153a217b2aa045c0be316163aee77132bfd4

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\zh-TW.pak

MD5 3d65c602fd24a760819c285d09e724ea
SHA1 361009e3ba4bfb9150c2857a94c9653a4110b68e
SHA256 84dcbb01d9c7a10bc917e03dd71a308b26f3039fa9396920a1879e7b5729e6ff
SHA512 0527313c7afd7334ba5a3e38d939742290eccd913f623dfb116663a4a3463b3e19efdac8cfcc58ec60bf6dcef9bc22ee90e57bafbe6d9a8ac02d5dfe15ee642d

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\zh-CN.pak

MD5 b457fc9721b9e8dc42d79faf9664f291
SHA1 179784da74cf0ffc4c27aeef076b36bc24f31d78
SHA256 01cda9e14d58f50d637f1fd6060c3cacab4e9f8562eb348079111e3e1fface2c
SHA512 71d698689b7b93bf1b32e915205d92919a0af64452c613e6678048db717a112be883cc89a85e06698bc5e62eaf2a47d4de629724584a5dcb19443d3c870a7695

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\StdUtils.dll

MD5 c6a6e03f77c313b267498515488c5740
SHA1 3d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256 b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA512 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\swiftshader\libGLESv2.dll

MD5 60f7a0f3ffdf96df5c861d3c9f964961
SHA1 6d903ba1057def4958d78be1e8d0a637b3c6874a
SHA256 bb055375ebafcc890d4a86af3609d74b2836b6770af28570c531f2ee28db6bd2
SHA512 f9fd54490a73b4609c2ca9982dfa7d3931c7df840e1bc3571ebf7568cb2784b8eb395ffa0ae395fbe8f3f8cb4bbc6820d3bdc3cce734c8623ea089d2b2483ed7

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\swiftshader\libEGL.dll

MD5 8fc5c3b6c2d12869896b391ce9047ecb
SHA1 9568df98d3cd12b5110bcd9879bb1ac71a2cc4df
SHA256 6d24ef2dd27e80f898e5e3569db01229b94336641944c9456daebd8f3991cff3
SHA512 c892330be8d3d720821de77a5fe510b8f61588e7cb64bc3359b1150168db1ccb6de108289819cb338bf6d3bc75d38747481f0f31de5a8c1566b9b18ef0821908

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\resources\elevate.exe

MD5 792b92c8ad13c46f27c7ced0810694df
SHA1 d8d449b92de20a57df722df46435ba4553ecc802
SHA256 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37
SHA512 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\resources\app.asar

MD5 cc651f6f556413f41cfe12204698fd48
SHA1 71a1f0989a7c8dd0265423a8c6d80aecb4ab63fa
SHA256 e78e9b3e906bf04f16a41758bd76f7d28a4c5280a03fed5aa203cc634bc95027
SHA512 c14e60d0a9c870c1e3010437fbf9178e5c71c882f1fa5c1bbcd39bfb67cba1eca1dc773b0b5c46873fa5dc61f3d2d184dd5c78b9b9502cc365364111407b979e

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\uk.pak

MD5 f9f596ad161cd6e71b643125654e2084
SHA1 33c54c089c54fbea7028f57a9c7f1518168c8f5d
SHA256 1f50dc81b3af9abc27f16cb3ccdce9c4a84599c24525513a58782c3cc47f2923
SHA512 afbf7916f0aac94de8618d9daaf64d7daebcb4907a605925885a3ff74eb460b47a46e3deaeaaa60edbc9307679e4be0c0ffd9233a0b49d2e169fefe1090cba38

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\tr.pak

MD5 6da36fda3f4593b1ed342a2980c2399a
SHA1 750d1d5fe8a1d310384356953111c7f01174c1f8
SHA256 58f245cdaea7c3cc6059bd21ee9f587760f30b67009c1b7a7307ba6cb5266207
SHA512 540615903e04061fcd2fd52933e2e01e09841dd2d72829dd6b69a97dae24c97d38d0503c378512660bf28363a3d716aa2c5393148d7fcdc6dfc9ae387506110c

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\th.pak

MD5 349fadf44982eac1e125653267f0b4c1
SHA1 661ee5255bcffa375d07c20cfa76fe91dd88a636
SHA256 d2608a61e3012fc164550c2b8ded70d91a00ed8103beaae8a90ab73d49ebb161
SHA512 00de83a3a695d055c5170b16b2e1934c6af703db3918281d7c31a06d55811a75e0d5f9429709ddfef316a31dfc555cf4be62796f42541cbed790af6c9d10f344

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\te.pak

MD5 8e751cef31655c77feead2fdf3186cc0
SHA1 760dc42013105a282d0fd960849852c031128b63
SHA256 e90c0e5f1727238898b77017bdd46c89d1d504dc2e0ad0a9d8e73a48e6d2fdc6
SHA512 dc49008af0200159371a3550613b8d7b90391169add9f6fb69005eb4bfd2363a82585507075034d835bdb65fb9f750a009a18dab589209f34b1f8e1374d8d01b

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\ta.pak

MD5 5a63a23068b3e5258f691bdc23795474
SHA1 475631325ad4a22d7e25460f0682f3befe17df62
SHA256 8e7eccc9cbfd3985f3721aa8911b4edb9142d0fe49eb9114febfded112115b92
SHA512 9fd02c6c29c82bf33aef045d2ae717a0006b436d75b379e6af6e58a938a669a2892452759e7d74423ae19dd53194ed419befa82f19eaa5191bff0f6e9d062cba

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\sw.pak

MD5 1e4d039a17b2ec681fb139196cbcc40e
SHA1 19e3a3d8915e4e46fe3e816f891bd4fde46d8a13
SHA256 5fe75c17a678a1c131ac6aa5d676e5f5f6dd55e73f25640a219229a299ed86e4
SHA512 7a1c298994b7f346612f4ada2034b3c858d2761e92a284f0ff9431be536a4e481bbf17ed93c007213630d25bac7dea09ee6fb186433bffa773e5daa52253468b

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\sv.pak

MD5 5910a1db798d96122e25e109fabd46ea
SHA1 3af5207b731bb32b8b267693e658cf4f42b05050
SHA256 efb573a199353ac899928e896771c867d0d5047a90abe8efd03cc53a275a08d9
SHA512 b2b06e69c5f38923770cf3f71e632090282bb85c434e49b091742de49082e910e9146b2b1bf019e73f178795f4e736a4fd9764629ab7dc3dd2903985da2dae78

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\sr.pak

MD5 fe305dfcac5d6126c94124f183842fe8
SHA1 e5362a293acb534ff293ad002bbbdff1300ed25a
SHA256 a8daa930b1ede6d93e774314a47d1301302a25e275f09f2cfe798315d66f702b
SHA512 90e5d3057e6cfdd4d92c1f4c8fa0953c4acc52789780b52e43a0f195950423e6d167c5022be0362fdc00ca663c9969d2ae41290f8ff76510fd902afe9a17ee31

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\sl.pak

MD5 5eba56efe389fc26bba76f674874d638
SHA1 81ad6b0a0c29bac657b81a89c34e13c780679af7
SHA256 75830c187e5145c1bccbb00a443cd209db7c3d06f13165568e26a32aad6b98f6
SHA512 acceefbf953172f42e1321db5d23dff38b5aecde242b85d40d22efe631454b6aa609c05628ef97e8f58412287aceda2b5fb045fd6c8b41bf0525570c324afdac

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\sk.pak

MD5 ba66aed3e696befd6c603087d87facf7
SHA1 dab2c2a8e3f0b0a2ee061d9910c09b5d54424e25
SHA256 7e0626ca0ca3d510d828f20ea8f7e63bd56db7a37300138b2a2d8e2c22eb9637
SHA512 23e24d29d0c8e64531fbdce558293244465e4239f5fe1618d038968fba6692bfeeee36b434f3d71252a9c767948db11a83b939edff0b82e5794a65501ed38022

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\ro.pak

MD5 cc458834bfa5b085f7482fa2ab6b9791
SHA1 80644bc45b83e06e12d619381276f7d5ffda0d0f
SHA256 26fbb88be9aa8c4f53b541f717a76da6f86083180fd8b4b62c33e595f3b95690
SHA512 56e1ee74d89e3c0011f782dff6d6f5035aa58591946b480a27705568fff6be0e522d5cdee7a953c58e0547be5dc53d624be32399dccc50b1417788f0491e7035

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\pt-PT.pak

MD5 4609853e0e58f3b5a8d421ebb7d75246
SHA1 e6bc5d2a688a8bb1e6a3fc14a26be8343dad680e
SHA256 28e09b59a01763e3d4c4f37e4187185d1fc9abc045ed4dc49b5a8bc59b4c31de
SHA512 4ec1cf920b40f5b44f5d6094fbc302f53c7958391b2ab556f190216896a951ccee4d1dd8a222063c02612e48b2d065dcfc7de4eab69c9436846e09146917b8d7

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\pt-BR.pak

MD5 b797b8f9602d258a842878c11d7ace89
SHA1 e1a12c75ef8f146cd7cd4120f715034b3fe7fefb
SHA256 5130bd0067df0c536a4134acb966d062150fa9f9e8d464540f366812ddfa726a
SHA512 8e977ee649eec0b0d9e0c94e02221233f6373ee61087f2e940d92349c5778031154ebdf45e0be996c7c9129d3987d540c8dd2c13f23a0433dfbbcd9044cee7ab

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\pl.pak

MD5 dcbc17b60531458cfe5aa8565b8f8e97
SHA1 11c81de7e89889c98703e79d4d4e7a5bb0f586bd
SHA256 774e4828ef7f93ca68d69cda6acc15232f82bf188e4d7bd82bf568b4983d7e53
SHA512 bf61bd84e413d08495bcc6951d2816052fd26eaae2ac64b4ccf7514745c6d2c0f1cc6efa2e3eca5abe25edb9a7172987f226d6520ff0a35fbf2d26d82568441d

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\nl.pak

MD5 8c737198948340f9a0a977d99c41d24b
SHA1 c12316fdf16fc495c62d20cda097bd7e1784454a
SHA256 8299aebf4705d087a6df4d37bd42bd40d633ff3f016050df0c55b797cd6e76b5
SHA512 75cd261ef148e580476ee6bd126c02c022f045bbac5ab5790460f208bba46eeb0f2346f2c3fca1848852bdb02ce42c96d852b20008b809c5a23e584e8d65fd7c

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\nb.pak

MD5 906145785a21bfc4b3bba5092e894059
SHA1 c61757f0bfeabdf35af9eb822b9179be273255b9
SHA256 fcdbde0a8858167fecf295584bef157f779e68f925ff16750101f6ce7323d9d0
SHA512 5646be486f245145f9ba8a65e2047addad251757031021c2c969c36c70e98b86e1d20b1406bde1d95112988ced6601e4ecc6a62866177463137d08f5cc95df58

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\ms.pak

MD5 e106a771fd9e8b96f00e7ddc782e3f6a
SHA1 f7c54a73abeb4b889d28ffc38e6bc9af82672a56
SHA256 978c2b302913c3f6c17db27486153b264b6678401927a08be2d60a73647c94bb
SHA512 c3aa94abc00acce6ab89dffc7405d0dc4153cfb9be0e2e6b3ebfeac5964c96437bde93949385527541f7ccb8498025830013e1f222325f84858423da1576fddf

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\mr.pak

MD5 2042ac8a4a716c6a4f16e1f93ab55a74
SHA1 6b0be2d4dfba73f951642d0fd665641fa66d18e0
SHA256 6a7141f6b5fc4de5c0fb7cef0515cc5031286901096f3536c50566a55e696835
SHA512 8e2bca475204ace4d619261de6c4dd6050d8d4e180dd93f8c9e6ce06083400c0cad2d81beb710524b70b8a3e09543a574a8b0bed3d9a043b8e1b1fcb491cbee3

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\ml.pak

MD5 7c2168a0cf1d62ddba6c3fb03bac6837
SHA1 27a3bac23de7833a1d6b1ea7f5abae8c9507b000
SHA256 5e467e46484985e96d830d1532ac9bded252fed551a3f4adae62b2ee57d7ede8
SHA512 fca43c8c8ea82d0c197d21ae0c32203e3657a1c2876bb3822a42f42ad5edf4040ada8594e70a2fbe840f16b656855a67d5fad09b445ec2f95eab02dbc5c6e3c2

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\lv.pak

MD5 0860a9f3eb0201e7071472acde08c691
SHA1 3d7ab60739423f75f0d6e2060df41b2ed4d003d9
SHA256 a1293552b0efa2c954e029ea21281b3cd8e5e57b466a02c5ed75ae4b6764ee8b
SHA512 9a51d0f60c6a072466a2ef955f6dba674f8646e1d6ddd3df1ee6200352dfd7c9976ee532d9143c22b749f715ef70940ac266612f4339bfc70a4aa46475c785c7

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\ko.pak

MD5 1523e71c4c5ada7819ad2c809434db30
SHA1 12ced5e9929c2a6ecff7c3f5cf0f909be9907607
SHA256 ed41ce8258b607b7a1e4ed5942d6ae577c8a09ae88ca39f3832986ee9849c7a1
SHA512 21767eb766eb9a53e4d4455cce013df09d8a9977c41e9224140af706656c15626e6911d15f5b1649bdfabb13b50cebedc4a38ee2585699792fd015031984da3d

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\kn.pak

MD5 bdce88966fe4ffee45221d5d2413d171
SHA1 04122d06f89edc801749f890aaa1fbf6c9e42b9c
SHA256 f4e907450416b3f49f4f59b523b146e9e72f0c080e19fa69a5372046c3b2264a
SHA512 150fca4214ab93a924cc42aacf0752113180175d8e06f36d40a87eb9d5a30ed1a80ee1f838a6decfac5caf64515371017f56ed9fef0bf4a32f6cb9838aa64a1d

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\ja.pak

MD5 98782b0343b4ada9cdfc60334ce88ff1
SHA1 66a435246e77c6c9656cb42dcb8aa1d02dbd1422
SHA256 cda16813348def319c043e7bfaaa7c058e53bbc242ad8954eded5391e4888cd8
SHA512 8ab500cf2ba2dab91f99eb895e32174eadd8dc90bdaba5fdeaaa54e05a6b3f3240e0008eb59324e1f017759678a41c9306547c61da5c5536126bd379bda1c577

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\it.pak

MD5 e26c1a2291cef617cf0aec36abb997cf
SHA1 d4ce53b6b9e3df6df1a33a38858370175e516c55
SHA256 73e8392b4a6e09b2227d8e9f465f509f01cdb1e5b3d29bfc52172c91920d7968
SHA512 8c64f93561171271f9be15da291970bd66f64c7f0be913f7a10a864cabc78e6eb886c7ace5dd2e0d0eca05259cf78c4fda2370aa609964415f7733ffe1fc578f

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\id.pak

MD5 bdccf52de61554dcac07536c2b43edc6
SHA1 0cf291ed2cf2c9c8bde04e3f59d4863b42e10322
SHA256 a4773647c12cf7facf511be5ad583c95d1ac020e6d02f8a5d048c85d15839f99
SHA512 ebe085d899dad8d4fe481ba9ab4251d46415214c0721c9a3c0bc0b52db88f207e5933c2f6650c8b0449edc980202561dac860843d71b1262142d262d2c919d15

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\hu.pak

MD5 f4c0de0a17f3e6a53f221bfff4aa64a7
SHA1 e82e59ecd1cea48f82c97b2dd5ba87dc6f13251a
SHA256 32fb888b7396b23a399cc8b8b58fadc8a7c04e8ca417f8f8772061803529f470
SHA512 171a3ecd205aeb1479664761dfca6bd450c471a7137296f1164df0c3641a94ff4d3fe326deb7e8ab6998eb6df49b1b5f8443ecbdf8b4b2f70dbfaafd9922e164

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\hr.pak

MD5 ae8fe3c5c3c3faa12aec04b44048f69f
SHA1 0a69e11d095c8ee8aea5aed21d4ec919bf20eb1c
SHA256 98e02706c2de8deed2b1e1d18ef2f75fb53c18e78a077275d0c266ab30d5a013
SHA512 2bd62bba86f04efc7929d0c5656efe71344d6dc7839fc12a04c2931e7e7f83795aa925b204d02e2509511b491a0b3f793ffc093f8ef0d7c91cf660ecfb0b8f1c

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\hi.pak

MD5 0863745aa43ca822811fded0f6672252
SHA1 7567366db5f6d2b6ec8c37050d746e3d0158d8cd
SHA256 bfa56fbe708a02e7cfd9bdad4b379947d5ffb753576a2261a4ff953e18a22df6
SHA512 ef9aff00132c8281a5f1c8252b460dc674128b9fb5ce772549eb758b89bb91702b2b6a9d40b698b5adc317bf22219d6d40f32e87d66b8a960b5c5b57d67a36ac

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\gu.pak

MD5 9dc1ad986a7f03cc5a4dce34acf8098c
SHA1 34eaa6f57016264460f12912d195704e285a81f5
SHA256 4ed43b7f782a81a478777464788a65ebc939e4b6995ec25e612b222ae9884d77
SHA512 8d63b39fbecd148b4e156ebd1e1bf6ef07e00cdbbfbff80b5e7a86f8e1b9a69c64b6d7e6dc88232aa8c59cfbde72de3cf567da140bef026747c1ee86fc7d6e80

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\fr.pak

MD5 0d35752e733c3298903804a248797ed0
SHA1 bfccc581ddfa348b4a58e17336c6f3abff5ca3d9
SHA256 627965026500d609c51b1d1abe858711b547272ea6ec0141c3fafff73145f6db
SHA512 2c6f37306551b9d36165a08633ef8eac91bba19764ee180a78111371993ccd69e38cf8edb07bc86a43ceb15e1c605685973783a5cdb960c6e4208900ba0c176c

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\fil.pak

MD5 b69fee960d82bbaa106a28fd7847e904
SHA1 b8e4aff8de27dad6b605574318955fbf32a87139
SHA256 044104a8f2e54418b2f8fe44132ea6406b2043495564172895d2c748f2261fed
SHA512 af10eef2531a03e4767b54a0541b7501fef247ead879cc70238369aaa9749f7cbe30c3e6d79876f9f6b8b24bad58feea7b92b817db3948c9832b20052e6b4a1a

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\fi.pak

MD5 6cc8910e96378d3f752352a4c6ded107
SHA1 5f2af2eaa37dd1205df6b32a24b20cad8020dc88
SHA256 b5a8c4f72727485cce72c86c6b590f8305424bff35a05bccf25f7ef3227ecea9
SHA512 4878c4c97c88fc1faf1857507c830b90f15cb367a20fb575edbde12d2372b69012d5e367d6cb0ffe23976cabc4fa3f010ca8782a04b99961bfac85393ab0c0e0

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\fa.pak

MD5 824bacafd8c6f795f2d400dd805d6017
SHA1 e4881822df1a6de69dce56980288a48fda428148
SHA256 2dd63e6c428cecd9f90880fd65cacb53844b3f8fa8b993a573db5f97487f1e17
SHA512 a91fd86b01210033772f52f06926d45a0f70cc40aae291b6871410f03e2f54e4df06f8e5ac9faeb1c506bd302462e872bc0d6dc5f8190c522cf4118ea6521fc4

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\et.pak

MD5 ef768cdc54fa927a463d4ba8e24d51a0
SHA1 3acb64231a36ea8b53d03eeabb0ae49ca1c95c56
SHA256 b66c92e01924e6af935e58a8697e290f2faff38d27185bbff4e51f305ad8c01a
SHA512 cb5d438de0c44c0487ff5ded35f10980ae28709f5961966c13300b54c2367a034660f37fd93a30e61d5f30970c1d38338ec6ec76b7c01efc819c54d2e87ffdef

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\es-419.pak

MD5 5164eb594b97a7b6a7399ead0baf4d79
SHA1 f3d30ba7bd66474ddf9adc903f5a6b8e18e5f3ee
SHA256 a069e8d14a8b442368d5eebd169cf43dd622e9763316328a7abf0825a1a26a49
SHA512 40f2752aa8986019f3a660bfee0f107eb6ee37e7b646e0881ce26469b5422dc5f1c7187b0057f73e6469ea9c42944870ea720f6570375b6de13a8cb486660ff2

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\en-US.pak

MD5 88b9e849c0035cb100d031fa5e3fa0b4
SHA1 3576e0fa589e53ae36d2b75937bd3c5c0ab8dbfc
SHA256 25462802f57f52581d34d67df00f7a4d62cb5ee5ee0e5e853f48ad9caf04dd89
SHA512 99e8cf196cd9098adf74f569d06043809454860f8f3de9e942f3ce3c2faeeaa3d6bd0572503cb6c2a6b932aff9aa7e4542501731693ec6a015cc7282af388e8b

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\en-GB.pak

MD5 75127302ac25474709f4d4d9d003d1fa
SHA1 dc3e4ff6240c6fa27d0ba2cf4e75efd05c4bd4ef
SHA256 c4874d32ae74029a6d9b244aa939200ba56acbf80e142f70a4b4fbdb61a36bac
SHA512 5ef0369b633f6bc4d75b660d772ec2ba69310ffd2068a734d9e2a8cf3a75c61e198dcdbc9ad32eeecf7aaa66d0eff03e1bfe3aa22e5ae438cad3002897ff2c0a

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\el.pak

MD5 b1da4ad2fead83209fa74cfc013b5497
SHA1 81e1a7a79abd0a0cb8f7b45cba305b40b3212a68
SHA256 ea33d6496dc71fdf3ec3ca61728f74063b9c81b726abdc32a19fa37299ac7e6a
SHA512 9ef3c13464d73b405dcea13d6e8be27b3361abe4b0435f76a2704ebc5e6a18a1741220e713b76625727b926e26dfff2bbd7225cf1da9cc427f80672b21679911

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\de.pak

MD5 a2f76deb231427db252713b1d370a2c2
SHA1 e15c9245e8f1a50d1ed0d7aa61bf22bf9e668d37
SHA256 d853202c9d590fa88ff7c2adc57917ca01e829b4f87d803d3be6a0dbc09d3af6
SHA512 67a293c5109ba729cc7833b08aabf5e464e54ac65e286137d228c76c407e81b733a01f5be6cb770c57bad539e7a0807fde7abf880004cda8b497a882e07753a8

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\cs.pak

MD5 fcd85a24ad96b0e3ed1454e1b8729bb8
SHA1 df1d2dd77bc9a90e580d73d3efc4c794483780d5
SHA256 60b495222c37a0d56ab5ff08cf0db75ce229b54d5c36c029dca63b17bbe9985d
SHA512 990fe2bf940152326d931c67f6a9e366ade1d4ea018ec18e09bf92d678364898b1f549b9d89343079224aa8243d96b51b94b85b879303210eb47769625b34ddb

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\ca.pak

MD5 22f24a5207df73e810596cac96a08c4f
SHA1 0788734189803356fdce9e96242e81c5f76416f9
SHA256 1432bad4cc1b1fa4787aea2fff4b6d54e9722e8433659e2c763a02352b945841
SHA512 51b76a9af885030faf62b1f340b124ef900be93e4072cb4c67badb394936a91e85e3f9793690548d7159a68ec48c4b3a96c6b01a46a509426583dae7e815bb4f

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\bg.pak

MD5 6673c15b24452ed317a2143fac853ea2
SHA1 121543fdc1374e072068b939f89a8ef07839ad94
SHA256 99fee30e8f3dc7c66eee4f7a4b08d385ca5cc3e076d18dec4bd83ad4693643a6
SHA512 b4b3fa8982b2954be2252ef26e7984aa80a1cef26ab3e1ef4fe93ee3649a292d6ab8bcb48afec6bd741bc9847f9d1ac249ee39e27612318720b38a50d28fa779

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\ar.pak

MD5 a1924e7f237e038bc916feb9365ff3fe
SHA1 78f0d15b14602de1bc82660f3c02151a4ea32f4a
SHA256 faf5d56309aaa2576214371f4a55360c2bafe2eb6674d0fb72f2a1dc3aae93b1
SHA512 300dc8e3d35a11cde5be9c137279fa2236e5311ab72be6cc6e393210ff23d635b565497db5dd0e26205d92d2afdb85c3bd41600973b2ed95e5b5893ddc406b65

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\locales\am.pak

MD5 cea549409055b1c6fe04c6932740e94f
SHA1 fdc6f84f97d506e5620c9ae4cdcb6f857ddac3dc
SHA256 fab95a53ea884bcdd304acf6771e6ad77c2ed0b3d019ca78d3313f9665e64420
SHA512 6c4efb2cf1c58329077fb045b3da6929c82eb3e3a52ec90131c95e63c4ffe54e92e0db8d787dc74573cd1c0cb07b487d83a6a98ff703ffbed9dc28b806ac5d57

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\resources.pak

MD5 ff31c1a39edc8202e052a41fb977a300
SHA1 f220ed82575e346c2fb086c0868c07318d57ef92
SHA256 965dcddcb984a231fb2356d6d7ff4e047c2d8fa527442fa64981ab5d254525c9
SHA512 3b3370dd630fd200969331ae7d9b7e005cfbc3aa41ad128274bdc7797de2eca89998787a90a96baecf25ffc64e2c764cb75051efbac57c679abfd17b47873cce

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\LICENSES.chromium.html

MD5 dfa12f4edccb902d7d3b07fae219f176
SHA1 c2073440a5add265b4143de05e6864fed2c3b840
SHA256 501f0b7ebf0be7ed8702d317332a0f8820af837c0a2a1d7645ba04352270e2b8
SHA512 eee3a8e0eeae139ddd9369d0869c29c91007bf6c5b0d7982918d5a013214a9e80b9233e7c1ccb43124152f684f0b782831b0a6b3d126558261dd161230004e50

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\libGLESv2.dll

MD5 c803659d06897fdead1048873590d8ec
SHA1 6ec313dce8672a7f8851da6a3a460e08237c3f6d
SHA256 d1cdb910bb1d7c59611eec613c1d12414dfc4b69013daeff6d9e0b9ac10f5f60
SHA512 013ed30b6fda93d058b7844a41f4849679d869c73976f04bcc4fd3bec043610c98726d12e288a40fa30d7834bcf8e25dc621eaf0cf36453b0c6ae4360c307fd1

C:\Users\Admin\AppData\Local\Temp\nsjAFA.tmp\7z-out\icudtl.dat

MD5 d866d68e4a3eae8cdbfd5fc7a9967d20
SHA1 42a5033597e4be36ccfa16d19890049ba0e25a56
SHA256 c61704cc9cf5797bf32301a2b3312158af3fe86eadc913d937031cf594760c2d
SHA512 4cc04e708b9c3d854147b097e44ff795f956b8a714ab61ddd5434119ade768eb4da4b28938a9477e4cb0d63106cce09fd1ec86f33af1c864f4ea599f8d999b97

\Users\Admin\AppData\Local\Temp\a363fc67-eb96-4f39-832e-5a0b812293d8.tmp.node

MD5 ab4a1c882f829aaeb65be643caa4e88a
SHA1 a5ebfe571aa30feae9ff52cbf18f7b0ae3cccb12
SHA256 9e29441fc2b83a9f2457f7e4e4c829970883b34a891533228c85fdff3e703db8
SHA512 548055c6eaddaf2aa66abc53ede4e311aa942d2d33ee6bf47e694e32b4c54bde73322f5d88b3192fde4f9226f265dd0d156573b2434ace8af5d6e36af182a880

memory/2176-548-0x0000000000060000-0x0000000000061000-memory.dmp

memory/2176-579-0x00000000779A0000-0x00000000779A1000-memory.dmp

\Users\Admin\AppData\Local\Temp\fb03cdfe-f43e-4a06-9e2a-931d8ad1d55a.tmp.node

MD5 083fd9f2e3e93e1f2c599a2b609c9e5e
SHA1 6db2b6ce3e60d828ca32a6000c270c09224f3139
SHA256 5800c926c34c7ef38a45840c30e8855c1b3a6ec1ec8f37ffc6ce2d402728eabd
SHA512 08206b13d7e91f36d65de545b483d5fa446c2a1d8baab4c2fb19aa711af10cbfd98da3811d34a16033b5c09eb297fdcfaf09a186b4dcf69e84bb4dfcc11d96b2

C:\Users\Admin\AppData\Roaming\EpsilonClassic\Local Storage\leveldb\CURRENT~RFf772932.TMP

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Temp\epsilon-Admin\Autofill Data\All Autofill Data.txt

MD5 dec2be4f1ec3592cea668aa279e7cc9b
SHA1 327cf8ab0c895e10674e00ea7f437784bb11d718
SHA256 753b99d2b4e8c58bfd10995d0c2c19255fe9c8f53703bb27d1b6f76f1f4e83cc
SHA512 81728e3d31b72905b3a09c79d1e307c4e8e79d436fcfe7560a8046b46ca4ae994fdfaeb1bc2328e35f418b8128f2e7239289e84350e142146df9cde86b20bb66

Analysis: behavioral27

Detonation Overview

Submitted

2024-07-17 16:53

Reported

2024-07-17 16:58

Platform

win10v2004-20240709-en

Max time kernel

134s

Max time network

151s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\vulkan-1.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

N/A