Malware Analysis Report

2024-11-13 16:53

Sample ID 241108-qy5dbstcmj
Target 3acca6a8bc4d733089fe98feb50416dadeb98651
SHA256 469b2a19deab693e53b7ea3d2c26833067fe6be1b9493505091fd9f586c54fb0
Tags
fabookie gcleaner nullmixer onlylogger privateloader redline sectoprat socelars vidar 706 jamesbig aspackv2 discovery dropper execution infostealer loader rat spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

469b2a19deab693e53b7ea3d2c26833067fe6be1b9493505091fd9f586c54fb0

Threat Level: Known bad

The file 3acca6a8bc4d733089fe98feb50416dadeb98651 was found to be: Known bad.

Malicious Activity Summary

fabookie gcleaner nullmixer onlylogger privateloader redline sectoprat socelars vidar 706 jamesbig aspackv2 discovery dropper execution infostealer loader rat spyware stealer trojan

SectopRAT

RedLine

Onlylogger family

Gcleaner family

Redline family

OnlyLogger

GCleaner

NullMixer

RedLine payload

SectopRAT payload

Sectoprat family

Socelars

Detect Fabookie payload

Vidar family

Vidar

Socelars family

PrivateLoader

Fabookie

Socelars payload

Privateloader family

Fabookie family

Nullmixer family

Vidar Stealer

OnlyLogger payload

Command and Scripting Interpreter: PowerShell

ASPack v2.12-2.42

Executes dropped EXE

Reads user/profile data of web browsers

Loads dropped DLL

Checks computer location settings

Legitimate hosting services abused for malware hosting/C2

Looks up geolocation information via web service

Drops Chrome extension

Looks up external IP address via web service

Checks installed software on the system

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Program crash

Browser Information Discovery

Unsigned PE

Checks SCSI registry key(s)

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Enumerates system info in registry

Kills process with taskkill

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-08 13:41

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-08 13:41

Reported

2024-11-08 13:43

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

Fabookie family

fabookie

GCleaner

loader gcleaner

Gcleaner family

gcleaner

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

OnlyLogger

loader onlylogger

Onlylogger family

onlylogger

PrivateLoader

loader privateloader

Privateloader family

privateloader

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Sectoprat family

sectoprat

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

OnlyLogger payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A pastebin.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Looks up geolocation information via web service

Browser Information Discovery

discovery

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09fad3e269114b07.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f2a9604ddb0ce.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat0902ab982e32902.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat096d657bea7.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f2a9604ddb0ce.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\xcopy.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09fad3e269114b07.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-GQTS2.tmp\Sat0902ab982e32902.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09ac626c3b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09fad3e269114b07.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09fad3e269114b07.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09fad3e269114b07.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Windows\SysWOW64\xcopy.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09c148600d822e438.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f1ff9181e817b86.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2032 wrote to memory of 4576 N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe
PID 2032 wrote to memory of 4576 N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe
PID 2032 wrote to memory of 4576 N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe
PID 4576 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 468 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 1468 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 1468 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 1468 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 940 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 940 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 940 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 3708 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 3708 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 3708 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 5080 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 5080 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 5080 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 3768 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 3768 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 3768 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 1920 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 3768 wrote to memory of 2856 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat0902ab982e32902.exe
PID 3768 wrote to memory of 2856 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat0902ab982e32902.exe
PID 3768 wrote to memory of 2856 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat0902ab982e32902.exe
PID 3708 wrote to memory of 2412 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat091ac9063af7.exe
PID 3708 wrote to memory of 2412 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat091ac9063af7.exe
PID 1468 wrote to memory of 840 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f1ff9181e817b86.exe
PID 1468 wrote to memory of 840 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f1ff9181e817b86.exe
PID 468 wrote to memory of 3236 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 468 wrote to memory of 3236 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 468 wrote to memory of 3236 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 940 wrote to memory of 2344 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat096d657bea7.exe
PID 940 wrote to memory of 2344 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat096d657bea7.exe
PID 940 wrote to memory of 2344 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat096d657bea7.exe
PID 5080 wrote to memory of 860 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09ac626c3b.exe
PID 5080 wrote to memory of 860 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09ac626c3b.exe
PID 5080 wrote to memory of 860 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09ac626c3b.exe
PID 4576 wrote to memory of 3312 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 3312 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 3312 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4576 wrote to memory of 4496 N/A C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4496 wrote to memory of 2860 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09fad3e269114b07.exe
PID 4496 wrote to memory of 2860 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09fad3e269114b07.exe
PID 4496 wrote to memory of 2860 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09fad3e269114b07.exe
PID 2368 wrote to memory of 3588 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f2a9604ddb0ce.exe
PID 2368 wrote to memory of 3588 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f2a9604ddb0ce.exe
PID 2368 wrote to memory of 3588 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f2a9604ddb0ce.exe
PID 1920 wrote to memory of 552 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe
PID 1920 wrote to memory of 552 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe
PID 1920 wrote to memory of 552 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe
PID 3312 wrote to memory of 2020 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09c148600d822e438.exe
PID 3312 wrote to memory of 2020 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09c148600d822e438.exe
PID 2732 wrote to memory of 652 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe

Processes

C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe

"C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe"

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09f1ff9181e817b86.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat096d657bea7.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat091ac9063af7.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09ac626c3b.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat0902ab982e32902.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09f2a9604ddb0ce.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09b5258b63.exe

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat091ac9063af7.exe

Sat091ac9063af7.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat096d657bea7.exe

Sat096d657bea7.exe

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f1ff9181e817b86.exe

Sat09f1ff9181e817b86.exe

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09ac626c3b.exe

Sat09ac626c3b.exe

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat0902ab982e32902.exe

Sat0902ab982e32902.exe

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f2a9604ddb0ce.exe

Sat09f2a9604ddb0ce.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09c148600d822e438.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09519161cb25021.exe /mixone

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09fad3e269114b07.exe

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09fad3e269114b07.exe

Sat09fad3e269114b07.exe

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe

Sat09b5258b63.exe

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09c148600d822e438.exe

Sat09c148600d822e438.exe

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe

Sat09519161cb25021.exe /mixone

C:\Users\Admin\AppData\Local\Temp\is-GQTS2.tmp\Sat0902ab982e32902.tmp

"C:\Users\Admin\AppData\Local\Temp\is-GQTS2.tmp\Sat0902ab982e32902.tmp" /SL5="$60044,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat0902ab982e32902.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4576 -ip 4576

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 572

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2860 -ip 2860

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 356

C:\Windows\SysWOW64\xcopy.exe

xcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3588 -ip 3588

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 1028

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd6869cc40,0x7ffd6869cc4c,0x7ffd6869cc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,14555033388216199863,7125040429270792910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --field-trial-handle=2164,i,14555033388216199863,7125040429270792910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2184 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --field-trial-handle=2264,i,14555033388216199863,7125040429270792910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2364 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,14555033388216199863,7125040429270792910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,14555033388216199863,7125040429270792910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3400 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3304,i,14555033388216199863,7125040429270792910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3548 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3284,i,14555033388216199863,7125040429270792910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3692 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 676

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 756

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 836

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 876

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 736

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 952

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 1048

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 1048

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 1288

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 1408

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{tLNt-dWPVQ-sBsk-XuFNf}\12886413899.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{tLNt-dWPVQ-sBsk-XuFNf}\92030421677.exe" /mix

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{tLNt-dWPVQ-sBsk-XuFNf}\34828590509.exe" /mix

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 1932

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "Sat09519161cb25021.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe" & exit

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 652 -ip 652

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 1392

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "Sat09519161cb25021.exe" /f

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5196,i,14555033388216199863,7125040429270792910,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5216 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 hsiens.xyz udp
NL 45.133.1.182:80 tcp
US 8.8.8.8:53 ip-api.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 www.listincode.com udp
US 208.95.112.1:80 ip-api.com tcp
US 52.203.72.196:443 www.listincode.com tcp
US 162.159.129.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 233.129.159.162.in-addr.arpa udp
US 8.8.8.8:53 safialinks.com udp
US 8.8.8.8:53 guidereviews.bar udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 auto-repair-solutions.bar udp
US 8.8.8.8:53 onepremiumstore.bar udp
US 8.8.8.8:53 premium-s0ftwar3875.bar udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 best-link-app.com udp
US 104.26.3.46:443 iplogger.org tcp
US 54.205.158.59:443 www.listincode.com tcp
US 8.8.8.8:53 46.3.26.104.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
US 8.8.8.8:53 227.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
FI 65.108.20.195:6774 tcp
US 8.8.8.8:53 staticimg.youtuuee.com udp
N/A 127.0.0.1:54501 tcp
N/A 127.0.0.1:54503 tcp
US 8.8.8.8:53 mas.to udp
US 104.21.11.154:443 mas.to tcp
US 8.8.8.8:53 154.11.21.104.in-addr.arpa udp
US 8.8.8.8:53 www.iyiqian.com udp
SG 13.251.16.150:80 www.iyiqian.com tcp
US 8.8.8.8:53 secure.facebook.com udp
US 8.8.8.8:53 www.facebook.com udp
GB 163.70.151.35:443 www.facebook.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
GB 163.70.151.14:443 secure.facebook.com tcp
GB 163.70.151.35:443 www.facebook.com udp
US 8.8.8.8:53 150.16.251.13.in-addr.arpa udp
US 8.8.8.8:53 3.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 10.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 35.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 14.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net udp
GB 163.70.151.21:443 static.xx.fbcdn.net udp
US 8.8.8.8:53 21.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 cleaner-partners.ltd udp
NL 45.133.1.107:80 tcp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 content-autofill.googleapis.com udp
GB 216.58.204.74:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 74.204.58.216.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
GB 216.58.204.74:443 content-autofill.googleapis.com udp
US 8.8.8.8:53 facebook.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 cleaner-partners.ltd udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
UA 194.145.227.161:80 194.145.227.161 tcp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 161.227.145.194.in-addr.arpa udp
US 104.26.3.46:80 iplogger.org tcp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
FI 65.108.20.195:6774 tcp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 pastebin.com udp
US 104.20.4.235:443 pastebin.com tcp
US 8.8.8.8:53 wfsdragon.ru udp
US 172.67.133.215:80 wfsdragon.ru tcp
FR 51.178.186.149:80 tcp
US 8.8.8.8:53 235.4.20.104.in-addr.arpa udp
US 8.8.8.8:53 215.133.67.172.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
FI 65.108.20.195:6774 tcp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
FI 65.108.20.195:6774 tcp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
FI 65.108.20.195:6774 tcp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
FI 65.108.20.195:6774 tcp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
FI 65.108.20.195:6774 tcp
US 8.8.8.8:53 215.143.182.52.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp

Files

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\setup_install.exe

MD5 d2239d3a25f407500c2361f15e5e8c16
SHA1 33f770c7625323f52e2e2b20c112a67c14ead346
SHA256 31031b7a03407df072e1e553d5b2a8dabdb2463de7c5818c1f710ab4cc3a0f23
SHA512 ae507fc49a50d2766ad4ef2dd08605652e385ed681f1ce59b417e8bd493df1de3b1acda75bdbe8c6f46b292ecd1a6e56906f47a88c36708b1de5c8ecf2cacd11

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

memory/4576-50-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/4576-58-0x0000000064940000-0x0000000064959000-memory.dmp

memory/4576-57-0x000000006494A000-0x000000006494F000-memory.dmp

memory/4576-56-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4576-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4576-55-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4576-53-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4576-52-0x0000000000EE0000-0x0000000000F6F000-memory.dmp

memory/4576-51-0x000000006B440000-0x000000006B4CF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

memory/4576-63-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/4576-64-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat0902ab982e32902.exe

MD5 210ee72ee101eca4bcbc50f9e450b1c2
SHA1 efea2cd59008a311027705bf5bd6a72da17ee843
SHA256 ccecc31183a26f9949252d33a8207f4e3ddb5a38fa1fbcbd22d7521942a40669
SHA512 8a6eacb4fb610ffb9457025e031824167a5cc6abe4f25168022ead62f6735b43a5e0f72a11d3efdb590f4f583d382d094789530d219113654d1db76c4be50a05

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f2a9604ddb0ce.exe

MD5 5a2353aae7d8538d5ed0ee486330d396
SHA1 9246c223f1a4091197c6afa4c48097480ac8ff34
SHA256 d2c456164b7e39ed8c3132d7d38ed88d91cfaceb7ec111cffaef48b8ef03c288
SHA512 f4df8c52af12369bab744a5c30ab95b236396b24437fcd065efaeb5b623f1c5d2b783fc10923c3b39ef0105fb6a4e352239707305f71676aa023160603c7e964

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09ac626c3b.exe

MD5 afd579297cd579c417adbd604e5f6478
SHA1 ddcc76ddd8c41c93b7826338662e29e09465baa4
SHA256 64eab369a17ac181e0ce8236e1e971cec2fd07db21a28d220c6ed99ea34aed6c
SHA512 f468a39f0b6d15c4153207556c00e8e97ae61cd856e548ec7f0650e72ac50e240ffed7246f60ad0c5e8632bf7164611dadbccd18e7164e959b4b4d02f78df02e

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat091ac9063af7.exe

MD5 535ae8dbaa2ab3a37b9aa8b59282a5c0
SHA1 cb375c45e0f725a8ee85f8cb37826b93d0a3ef94
SHA256 d838cfaf7b197d6c3379e2c5daf269cc422a09df556de6ca08fe174b4906b3b6
SHA512 6be6a3d8fa5d1fb17f85bdacf873280a3a074739fb68037de1a50c63d2d24e5b6b3ffabb838c3097ff9840ed27391a3fb812c802010ca3db860414c34123867c

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat096d657bea7.exe

MD5 2fa10132cfbce32a5ac7ee72c3587e8b
SHA1 30d26416cd5eef5ef56d9790aacc1272c7fba9ab
SHA256 cfb5c20ec8d95c35f7edb8743084d4491e43c62c575cf0102b4f6781c50689de
SHA512 4e9338f89229bdddb5d7c803a415a338a75962e61ef47984a67efd1e81824ac14039d9abe2b26992a30f6d26c724058518849d71b6d1948c00b08ae95b0fd25a

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09f1ff9181e817b86.exe

MD5 67f7840ff079c52e311eca9580366cd1
SHA1 738525b29615c29801ecb22ba5007e7b83c2b2d4
SHA256 0898bf93856be4b31058da24084d84a0a944f333f06e05f83c40b668bb96d127
SHA512 fd97b08862aa4667639c5722f3f39f9e8079ac180447e65fc019efccced51a3a75781918a6b47c3d246bca3671618314814260a4dcdcc3d00c64f576a46f13d1

memory/4576-62-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4576-60-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4576-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4576-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2856-79-0x0000000000400000-0x000000000046D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09b5258b63.exe

MD5 10e384c9b18deb8bd24531d6e88d3a1b
SHA1 55a8924419e58828645a41f4135b6bf3c7f33b70
SHA256 207a0bebf93a483cf8df67d5dcd7414ebaca95a1509e051ab685d55413e7d89b
SHA512 519b6fa3413828895353d7d2714a2835b37ca5d0d861cfd8c56e8f0409d8fac8e156f7ec4653af26805f732547718a6e16dae909c7a734ff5e775091b24e414c

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09519161cb25021.exe

MD5 71d5b0cc31391922fc05e15293ecc772
SHA1 4057b118de7e9c58b71a43730af4ae2a4e7cc634
SHA256 3861370b4a6e7a5a84759a14a851c15714757115d9f689e65a93d9285b356995
SHA512 2a6a75e1cf2222fa8f3554ba16a3cb6bef4b4db0a31c0f17bb19580064ce318956ac58d6d44e06e60b45009935edf7597e69f500ef581bfe0f44c9929b602cf2

memory/2020-93-0x00000000001A0000-0x00000000001A8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-GQTS2.tmp\Sat0902ab982e32902.tmp

MD5 6020849fbca45bc0c69d4d4a0f4b62e7
SHA1 5be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256 c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512 f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb

memory/3236-98-0x0000000005030000-0x0000000005658000-memory.dmp

memory/840-95-0x00000000029E0000-0x00000000029E6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09c148600d822e438.exe

MD5 aae5a96fdb4dacba841f37cd6bd287e9
SHA1 ea00eeac88b11452e092b9f3cc1e5833a8d83045
SHA256 a64a3914b2b41dc192b1d792e6dc4c6dbae56d106f0940f3f7a49c5f4b00c56e
SHA512 d9846063a78b8e90bd5d42fc907b3410414eb2df7fc47a57a8467d7d8bb51307cd3a492dee7e3d735e7841829751dd4309ffa44651a098cdb7d4fb051ed7712c

memory/840-88-0x0000000000A60000-0x0000000000A90000-memory.dmp

memory/3236-94-0x0000000004890000-0x00000000048C6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-30CGS.tmp\idp.dll

MD5 8f995688085bced38ba7795f60a5e1d3
SHA1 5b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256 203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512 043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

memory/3236-107-0x00000000056D0000-0x00000000056F2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS0F7E3487\Sat09fad3e269114b07.exe

MD5 05df98ef620b4a298719148c502388bd
SHA1 1d909bd5f9d976654ab42360f4aba4b232d1575a
SHA256 bd0dbf1d4573f97acaeb4c9faacb7af147b9b75201b86e44f4a0cd429fa65be4
SHA512 db20bdae1a21b231c754d6a16045c7a85051d8999d1f73790a34784cbf06ba2efec310129acca8fac607b2111178d06143e7e920c5bb859750ef504d1e8b7f0b

memory/3236-108-0x0000000005770000-0x00000000057D6000-memory.dmp

memory/3236-109-0x00000000057E0000-0x0000000005846000-memory.dmp

memory/3236-119-0x0000000005850000-0x0000000005BA4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zjuujxqi.m2r.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/840-123-0x000000001B970000-0x000000001BA72000-memory.dmp

memory/3096-124-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2856-126-0x0000000000400000-0x000000000046D000-memory.dmp

memory/3236-128-0x00000000063D0000-0x000000000641C000-memory.dmp

memory/4576-138-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4576-137-0x0000000064940000-0x0000000064959000-memory.dmp

memory/4576-136-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4576-135-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/4576-133-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/4576-129-0x0000000000400000-0x000000000051B000-memory.dmp

memory/3236-127-0x0000000005E40000-0x0000000005E5E000-memory.dmp

memory/3236-140-0x00000000743C0000-0x000000007440C000-memory.dmp

memory/3236-139-0x0000000006E00000-0x0000000006E32000-memory.dmp

memory/3236-150-0x0000000006380000-0x000000000639E000-memory.dmp

memory/3236-151-0x00000000070C0000-0x0000000007163000-memory.dmp

memory/3236-154-0x00000000077F0000-0x0000000007E6A000-memory.dmp

memory/3236-155-0x0000000007170000-0x000000000718A000-memory.dmp

memory/3236-157-0x0000000007210000-0x000000000721A000-memory.dmp

memory/3236-160-0x0000000007400000-0x0000000007496000-memory.dmp

memory/3236-162-0x0000000007390000-0x00000000073A1000-memory.dmp

memory/3236-163-0x00000000073C0000-0x00000000073CE000-memory.dmp

memory/3236-164-0x00000000073D0000-0x00000000073E4000-memory.dmp

memory/3236-165-0x00000000074C0000-0x00000000074DA000-memory.dmp

memory/3236-166-0x00000000074B0000-0x00000000074B8000-memory.dmp

memory/860-178-0x00000000022C0000-0x00000000022E6000-memory.dmp

memory/860-179-0x0000000004B70000-0x0000000005114000-memory.dmp

memory/860-180-0x0000000002500000-0x0000000002524000-memory.dmp

memory/860-181-0x0000000005120000-0x0000000005738000-memory.dmp

memory/860-182-0x0000000004B20000-0x0000000004B32000-memory.dmp

memory/860-183-0x0000000005740000-0x000000000584A000-memory.dmp

memory/2860-184-0x0000000000400000-0x00000000004A5000-memory.dmp

memory/860-185-0x0000000005850000-0x000000000588C000-memory.dmp

memory/860-186-0x00000000058B0000-0x00000000058FC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Login Data For Account

MD5 a182561a527f929489bf4b8f74f65cd7
SHA1 8cd6866594759711ea1836e86a5b7ca64ee8911f
SHA256 42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA512 9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 b71adb82734646d6c25dcd1c22f33f72
SHA1 6e0bdc45513498bd4c91826afd2f68f83ce70493
SHA256 c6f69153e0fced57b7277dfb8e4aeea8e61a599cf94c24cb19007992469707d7
SHA512 ef135ad13bd94fd04052c05b75daba8b90c347fcaa67abd8ccb9d308f77cd850ca1395a8fbc160cc27b858a930e25672fd229c13d38d1fa485512cd6a696e953

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\wasm\index

MD5 54cb446f628b2ea4a5bce5769910512e
SHA1 c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256 fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA512 8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extension Scripts\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extension Scripts\000003.log

MD5 891a884b9fa2bff4519f5f56d2a25d62
SHA1 b54a3c12ee78510cb269fb1d863047dd8f571dea
SHA256 e2610960c3757d1757f206c7b84378efa22d86dcf161a98096a5f0e56e1a367e
SHA512 cd50c3ee4dfb9c4ec051b20dd1e148a5015457ee0c1a29fff482e62291b32097b07a069db62951b32f209fd118fd77a46b8e8cc92da3eaae6110735d126a90ee

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extension Scripts\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.82.1_0\_locales\en_CA\messages.json

MD5 07ffbe5f24ca348723ff8c6c488abfb8
SHA1 6dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA256 6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA512 7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\background.html

MD5 9ffe618d587a0685d80e9f8bb7d89d39
SHA1 8e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256 a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512 a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\icon.png

MD5 c8d8c174df68910527edabe6b5278f06
SHA1 8ac53b3605fea693b59027b9b471202d150f266f
SHA256 9434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512 d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json

MD5 9d21061c0fde598f664c196ab9285ce0
SHA1 b8963499bfb13ab67759048ed357b66042850cd4
SHA256 024872f1e0eb6f98dcbd6a9d47820525c03aa0480373f9e247a90a3ef8776514
SHA512 f62d333e6415be772751eeeaf154dc49012b5fc56b0d2d6276a099d658ebe10f3c5166ec02b215ae9cd05014d7435b53d14b98a20e2af83a7aa09a8babe71853

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\content.js

MD5 f6a25e7c3bef30f9a62caae063f127dd
SHA1 892d33435e59ae2217fb303d9067676135ba167a
SHA256 eaa839d20e1fe7233fada3a1a83a5c3e39de9e3a6ffa8075141e64b2f7c482cd
SHA512 4ce25900d848eb80d94ff7245dcc8a355127cfc186df2c25f849492184cdab7088068a1bbbd71bdd1ad46cdf11d6cc6b9d1aa0b0a41d87ccc43856e4d2ce9976

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\aes.js

MD5 4ff108e4584780dce15d610c142c3e62
SHA1 77e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256 fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512 d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\jquery-3.3.1.min.js

MD5 a09e13ee94d51c524b7e2a728c7d4039
SHA1 0dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256 160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512 f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\mode-ecb.js

MD5 23231681d1c6f85fa32e725d6d63b19b
SHA1 f69315530b49ac743b0e012652a3a5efaed94f17
SHA256 03164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA512 36860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\background.js

MD5 cff27c44b08e666215c2516abf83ebec
SHA1 445f9ce6fdb724124d14a7cd5260b511e72451f6
SHA256 e3702e876f97a58e36eddeb1a7fb2b78b991b223314acd993930ccc3b8425d53
SHA512 950108a5138489cb09b0288a3b5862c1ca95cbaf20f41c58135fe1286e259ab1cc8a6c357ecf9e2e588bc048eea1935e9c245750b47b3be7773221fd00e45fa1

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\pad-nopadding.js

MD5 0f26002ee3b4b4440e5949a969ea7503
SHA1 31fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256 282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA512 4290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\en_GB\messages.json

MD5 91f5bc87fd478a007ec68c4e8adf11ac
SHA1 d07dd49e4ef3b36dad7d038b7e999ae850c5bef6
SHA256 92f1246c21dd5fd7266ebfd65798c61e403d01a816cc3cf780db5c8aa2e3d9c9
SHA512 fdc2a29b04e67ddbbd8fb6e8d2443e46badcb2b2fb3a850bbd6198cdccc32ee0bd8a9769d929feefe84d1015145e6664ab5fea114df5a864cf963bf98a65ffd9

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

MD5 971c514f84bba0785f80aa1c23edfd79
SHA1 732acea710a87530c6b08ecdf32a110d254a54c8
SHA256 f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA512 43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\index

MD5 44599ded0fce872347eafaa4142d11aa
SHA1 242ba7a3c06e785faa0dac17a36d11d9ff1d1b98
SHA256 f0f5b9f4526b3d48adc1a8b8565c63e080b5370e54712e88d04e885cda084d2b
SHA512 f353a802f2068bd6a7a2867064cd215afa7f0ef6a1ecc28d1ade75041afde70090cb632f44eccb6c591c2457f468fd03db6160f43423a83d6a90bd1096832aa9

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

MD5 dcd66824371a3a1dd2ec897939b01e9e
SHA1 4ab0f28d71f72923a32713f415ef493312c765d0
SHA256 5a54cb3b3096b6a2c35199663cae46a2fad04f55c0f197920a7f08ca1c2ba64c
SHA512 4a51ed3713369ed3d4e275bc302d2579e79b70dacc312e41157407e580833fcc9536d0cfbdc3198813af22759564d7024b3cd6fe31f669741988bd23e95d2712

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

MD5 67e486b2f148a3fca863728242b6273e
SHA1 452a84c183d7ea5b7c015b597e94af8eef66d44a
SHA256 facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb
SHA512 d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

MD5 3cee52b25b18388e448476779a91ec60
SHA1 c9aa2b86983b92034d2eb31e866a4935272f53d4
SHA256 a276c272f98e07e6ebdf7525e6b06ca065a21cc5df7023027f3714050175db5b
SHA512 9849ede2c40f4cec8efbc345a14430cc623607a0afb00237249b7b7173eea0232de31c3fffda6e34a766e7a48603e655500cbdd6c15070ab803d8d15262eb6d3

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\index

MD5 8bec4ba6c35ca3c308f31d6fd25ce79c
SHA1 9a42f78c2697754257b3ac67b6cc70f85013a78b
SHA256 3482035201b11daf241c8bdffca0496fe171e14b6fc48b8950b632edcc8ab44a
SHA512 21ed1ba5d1ad22c10bf7a3c2828ba401e5d3802362df1bc423cdaeb20f060d5007906686c23bdf6b854a6e1ad009cb77219e7a6651854f95a740e0c9679f7c6a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Shared Dictionary\db

MD5 491de38f19d0ae501eca7d3d7d69b826
SHA1 2ecf6fcf189ce6d35139daf427a781ca66a1eba9
SHA256 e58156bca5288238d341f5249d3b6c91ab37cef515358953b435339100d0596a
SHA512 232f5df71e8ec35e500ac81aa54a87b3523fe8a32168096a2a76f08e5c7868100b3cdc5155786ead489aac440beee3f84ffa43d226a5b709c66012923b20c696

memory/3588-1272-0x0000000000400000-0x0000000000518000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\CrashpadMetrics-active.pma

MD5 9a31b075da019ddc9903f13f81390688
SHA1 d5ed5d518c8aad84762b03f240d90a2d5d9d99d3
SHA256 95cf4025babcd46069b425449c98ed15d97d364b2461417caa9aa0c13cb372e1
SHA512 a04726a429ae727d685f0836327c625d2f18d6327253216a9a31265a324b68b06bec4e7f1b744d261a0e67fa0a90c43719aeda9d2998f42525b0ff5640c7bf1e

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad\settings.dat

MD5 1fd21a5228803360e7498b21377bd349
SHA1 c028d9a423b995bb2f9d9b56ef09e5a4f9535b38
SHA256 920270c469d0fdd572881597d30bae6f24faec32c8a1e7e689186947ac7958d3
SHA512 c2324e1b0a32c3d4abdac5ee1c2e663d1e49c24c17f0b5a5dac56cc867f67d2665f29148de2773f2e048292b189d136876b557ae9837517f612155633cbb09b2

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Variations

MD5 961e3604f228b0d10541ebf921500c86
SHA1 6e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256 f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512 535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

MD5 9441bba21983b32955ec9583df2e85ac
SHA1 2a430430d5dec1b7f94673207424ce545328c6b1
SHA256 8251970623233c84ee3edba799232c788a14484e46eff1ee923765036925b11e
SHA512 7337eb5f784deb288d2bf5d370193ac19543560c021b29860308608b25d922063bf21f2b9c291ac2dc6e6c525436a50df51ead6bb78f69a5814d8c6c948af54b

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 5f2027f60f5f955d67cfc2ffa1df63cc
SHA1 81702229f30cd3a6b5733b57b94c7b0cfdc0c5c3
SHA256 ae0fd8e278f4711a1c44b012b05ea1134e13caff7258e2cecea8ecf9fa9f3df9
SHA512 359f99bfec1db68f4d5b5cf24ed62b46a41dee2339e19afdd85c2b1f542797539bba1796ef1de4a6c4380e37aeac3399535087e333f9a4cdb21d883407ba51b7

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Sync Data\LevelDB\LOG

MD5 27a87c84fc82394f2f8352aa64b3011b
SHA1 2b5a2011a3dd1b49648e87fc46070d37a1198699
SHA256 1833ae4365dcb1636144956be2d7522892e37ec2c006dc65a12bcccb1357df48
SHA512 d4f6ad429840bd43c274fd229ecb8b89b61293f19600d692bdef0e479de93f8e0da7c4044510c677e7d99b2bd7df97d01ab16bf6101fc4feb22c8d5ad5c9df91

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Sync Data\LevelDB\LOG.old

MD5 5768689ab5dac9ce745b62e54a9b4df2
SHA1 3b71ef23b967f7fe040f2709148644c496379329
SHA256 e5cef14cfe16b777726e32e6915e0455c20cb4dd806a11cec65e7c0807b744da
SHA512 6e3a90f0ff1cedcd3afd56170335f04cfe6d829724aec80be8f360da7387f786da051591e91938f9ef97f8049605922f3132bb4c5adc2f80c283194188bd54cf

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Last Version

MD5 ef48733031b712ca7027624fff3ab208
SHA1 da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256 c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512 ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\ShaderCache\index

MD5 52a6d280a3794b197a75159a8a7df9aa
SHA1 9b411352a674412e640ec605302558197636ab89
SHA256 c4ad3afef2c1aa6b093f1ffeb2825aacf60dac8798031e0d6b735b06c4026009
SHA512 2835d913600d538c2c965bd2ec736340ee87875a7168278d3279be7436a14b76c25aa5f95b18ef74cba90a446eb8933d014173d015277c314431379cb8211309

memory/860-1319-0x0000000000400000-0x00000000004C6000-memory.dmp

memory/652-1320-0x0000000000400000-0x00000000004CC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000005

MD5 c2b78d7a388c991a5eb6f97e37439209
SHA1 9b22565bce9903721cd4c3208e543275f0d8ccb1
SHA256 6b1be68af806d8ac07f0957f855751d5cf2b99457cbba0da14b8fdb2c1c77b96
SHA512 e4b0b7b1ce9a1a4387d24165bbb47dd8ec05d5a1d812dcda8bdf146a7a394afff162c44caac61d8da4bca7a125d9368c14beccfe37e8357c7a8176eec7aa990a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000006

MD5 dcb103cce793c24bbde5055ae177c3c2
SHA1 2c60c9913fd659459ade4523577db7473a2812f5
SHA256 af2932d7a32f633fe1b1ff9a72a650fc9ea8da63ba6565abad022eeb8b56c134
SHA512 c08a5330e7b6538c1ddf4e1296ec5e10ad88bb54046de771e39a6f265c2d07f25443b32f553a3de0ce6d9c39b634321d5ba41daaf186eae15e542e9243c02516

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000007

MD5 139dcc02730790b90b0c33f848d99c05
SHA1 87da8b439dff631f9d924779fcea254357f11869
SHA256 dcf6d129ee50196cd66a3aa2dff31847e20fb823d32c6551ee163471f5c38fa9
SHA512 a1694a1e3b29e664c136147cf5fc44965050fa2e05b90424bc428b72a40b833fc550d2d27681573e62aaafef66f3f54cd7f08d1b0ccd992eeb1972457e004e83

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000008

MD5 a38340113e3b08efe28c2de1c0b22342
SHA1 d0ce7c5744e7c696d6b786960073332e09d79233
SHA256 ddb6dd7e09ec40da43285a988d62814f3f189f4059c6626cccbbae667e53e79c
SHA512 4f21451b9a64c8ffc30f6228219ea2e3bfe9f3fb01669c292305d0bfed161727e8433cbc356b4e3b717a012a0f845949c97ca29ba55dff89a72048fd121f6235

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000009

MD5 14729cfe302b210307f85fc45e2d9b23
SHA1 7e682120a3f3f375e44e36eaf32dced70f63926b
SHA256 7682bd6b80f6bdf6a2a30edbb2f4a6b85b214b396ac176775d96d0d3ca48bf46
SHA512 46db928d4a34c78c8fd11a20bd82acc989c95e2d0dec4da4696696b84c82b4f2c03a54480f3ba0ddba4b03a460bfca0df3f2c5c761810743d827c720887f612d

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000a

MD5 f441681b4d38077a2171517b9d457fca
SHA1 711931b2bba09548873791ece35e7e091337ed91
SHA256 7bf003aec1a0428fff8a1e984efb075eaaaa67bcea10238ce9d998a9141c7691
SHA512 24ee2bdc6ebeb8eed07499c3a6137f172960a7039fdd5b8ae881d43f756b882918f04c6c4c44081c765d43026f5b149a13cf0e6c68551cbb654fcf06dfbe7e8c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000b

MD5 65004d60372c60b52af3f8a776ea34a8
SHA1 7c3d7a78642eb701e8491446c88a45c542414a53
SHA256 6a426bd8f7ed348f84de21e49322c118ead8df8833dd4022f4294caaa880a6fc
SHA512 9378de64219551d962dc8411a36659d4818c53c5fd9e8c98dcbae74b3b4d21551a294afba9ed1dbbf15b02a4bfa63e03a1d448106f507afc8a044e2196c4b3ca

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000c

MD5 67b5e07b95cd99cba17d94f1972eb07e
SHA1 5ccbfb91cc9afcdad6f680850cf445c8fd27e033
SHA256 7eb585b8c5e129afcf8a526ebd2e89f4ca8921bc45472f606ba9c6e550338393
SHA512 820a5847aa9f6742173596e25ed8d03d5dd88eb520061942d9dd7d733202ac30197d6dbb07136c7d6b2ddca2012254944ee09a4c9da5837667b0db79a0dc599f

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000e

MD5 794cf24d4f2c199c76bfa9cf38ea54fa
SHA1 42262c365a072cfeb882316659f9aeab6858019d
SHA256 c905408d9a16225970ffdcf91bf7b9ee775d378a603b2c5d67b17e71aedc9b9b
SHA512 33e2ab883611c87ae7625ef234edb92fc197ef8a772225a8420101101d6867fb3eda9f5eca6c80f9bb7698d4a953d7a34a1b9e9a552915e0c432978f6fcdcd5c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000f

MD5 5d8b68138dc91f883b9fcc4a2c9107b1
SHA1 34a20639ed42c81babe0b26378abee7ad1a7db30
SHA256 2ac6f8dc81f161f1c2cf702fa9e83dd0686bcb4b5a4e85b3586726eec953653e
SHA512 73398edbf38ea4b77d0e8a47513d0b9c11fc0994a394842385f50dcad631a20a4de0e5f2869c06d62ea62d2b35126f3dd809b1da62d8da301210719c76a6113f

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000010

MD5 14ea95b55b47c887643447132dd986db
SHA1 de2aef1380a6a0624271e364b6e43db40c4f1bf9
SHA256 dc02d2e69e346df37ed560966abf8b6a14b54e4e6005699318446cc6405b558a
SHA512 69d81b104eae3ea162aebefc599723a2ae8c1b408df28ea791f7aa3f56eecd85fb120233d7da1ef6eeeaa0481858feecc73a0daf6f17e55b8bc04c81fcbe2d3c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000011

MD5 fc4db204284d69eb5855913eb4261d48
SHA1 e7c292060f480adde41aceaec59d0726d86c3036
SHA256 4a33c234bbf512caafcd16203991132debecb09e8c8569043cf48b1493746e48
SHA512 198a96fa6bc9141b8d41b7ec99f6bc5c94078e5e7341701e67bc263a8d46d170a401f3ac8cb7c5a3228bd6a77d00d59f2ef8386043c871587675066b0a7d18f5

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000012

MD5 400ee3db02edcf0377b8b08274e437df
SHA1 868f730ab5dd51a7353ec0e38dc03498543988fe
SHA256 8d48f552547076c027aa26a0a7e9aaec923a84dd4ed2193cccfb4cacef129a19
SHA512 9174b7ff0754f9660237ec7030d992cf6e6b1bd55e8c11e46b70f400112c9ccceea2d28a05f4e8932af47b29ce11d3b8da2f669a71b402c4d08eff2d8046f74f

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000014

MD5 e1a4206de81eb473d22c9fb54de1c5c5
SHA1 e3dc3a5aab980521cca0ab797b58bec53219ce0d
SHA256 891fc4996a78ef55df629730cad4eb32368e1f7c8a7dfbaeca0c41dc87b180f5
SHA512 9f721c28600bdbb03a1cd16b305221860707c999890f2fbde656a596641291c0c90e4beebd6a9e561aa4dacbb458b6c0d5f24ee8f23c6f0c7714f7b187643de9

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000013

MD5 3669e98b2ae9734d101d572190d0c90d
SHA1 5e36898bebc6b11d8e985173fd8b401dc1820852
SHA256 7061caa61b21e5e5c1419ae0dc8299142ba89c8169a2bd968b6de34a564f888a
SHA512 0c5f0190b0df4939c2555ec7053a24f5dae388a0936140d68ed720a70542b40aaf65c882f43eb1878704bea3bd18934de4b1aac57a92f89bbb4c67a51b983ae3

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000015

MD5 c1164ab65ff7e42adb16975e59216b06
SHA1 ac7204effb50d0b350b1e362778460515f113ecc
SHA256 d7928d8f5536d503eb37c541b5ce813941694b71b0eb550250c7e4cbcb1babbb
SHA512 1f84a9d9d51ac92e8fb66b54d103986e5c8a1ca03f52a7d8cdf21b77eb9f466568b33821530e80366ce95900b20816e14a767b73043a0019de4a2f1a4ffd1509

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000016

MD5 b63bcace3731e74f6c45002db72b2683
SHA1 99898168473775a18170adad4d313082da090976
SHA256 ea3a8425dcf06dbc9c9be0ccd2eb6381507dd5ac45e2a685b3a9b1b5d289d085
SHA512 d62d4dddb7ec61ef82d84f93f6303001ba78d16fd727090c9d8326a86ab270f926b338c8164c2721569485663da88b850c3a6452ccb8b3650c6fa5ce1ce0f140

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000017

MD5 9978db669e49523b7adb3af80d561b1b
SHA1 7eb15d01e2afd057188741fad9ea1719bccc01ea
SHA256 4e57f4cf302186300f95c74144cbca9eb756c0a8313ebf32f8aba5c279dd059c
SHA512 04b216bd907c70ee2b96e513f7de56481388b577e6ccd67145a48178a605581fab715096cfb75d1bb336e6ad0060701d2a3680e9f38fe31e1573d5965f1e380a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

MD5 45e66deb852740b4a9e4f18a6cc84f8c
SHA1 861dbee2bbc937e8617d5b955fc5bf6ec1d70255
SHA256 6e6118cd2ba1fb486cb99f260374f0923696ac1aa4ae77ab44a1b33fab79230e
SHA512 e927f1a223a14a3da23418563a3b658f593204d34342dfe8b8a62dd37b484772612ffb4a59a8c9919b5e6d725c650aadccd08c5625d46015633c61a0860f3f54

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\9d2ba027-9ab2-46cc-b991-03e82b28e639.tmp

MD5 e561e57f8fd60d8dac7a52da3ffc9b6e
SHA1 bda521566a4acfeb9f38ab5014dd1801c0121fb3
SHA256 fe88c8abbd8db1e5d4ab76a837e0411026d877dbf55058ee063288b9172532e7
SHA512 d03ce53f09b8d9ebb908734f4f15327e066bd62f57e5d92ca4f1d1ff69f654115b266d1bafe0c5b052f16ebf2f281a0b21d6be6d6cb732d4603c43ef57573129

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 9c5a69b4b30312d05057fc6bd35e0117
SHA1 5185b7d4766ba919da1f4e269342797d5acfa650
SHA256 ae1d36a35aade3c67e8ab1678fced2a52b93556ccebd8539145a14ee014026d5
SHA512 86cce88285af8e5f3eaa058687ce6af9c7d6f4eec9eeff9e7acf64919a30f0cf48a9654cfdb9965b05e5074e13eb5985f5cf63575c4c04d21a28a05f41b7292a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 ebe4a79971df846fedf7f8ae3ac76b30
SHA1 9ff40b97d32f1942fc6043a36d4041833c817302
SHA256 a86df97529a2212bc93f7939ce2314730e081de7783d48244aaeadab5b954198
SHA512 86665929f3eca8cd72ea6c0b657a632ac69f8dca053ccffa63f47acacdb3f97212d67ed5dcf13b04cb3e3daa9b1807020dedcb5c87010af5f993564ab9d9f0cb

C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe

MD5 6445250d234e789c0c2afe69f119e326
SHA1 03074f75c0ff50783d8c2e32d96e39b746540f66
SHA256 2e6cd9433e66a9ebde268bc6949d4660de441790bd39ffc9cb0f4caaeb44320f
SHA512 ecd094a4d026378f85435f8a2dc16c92c033aff92ba126d8bbb22d6b279b842d417f4df0f63199ea248d0ec64b9679acb5a1f835560d8e3c5b84be492cc0e68e

memory/652-1663-0x0000000000400000-0x00000000004CC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 19cf606988af139ab2e423a0c7f0d13a
SHA1 c42c45a4d92e28f16126bab1e26ca318b298250c
SHA256 9225a48f4d796e3d39f15fbda29844b7ea105856552fcb9b822b497b5af6b8aa
SHA512 83d9db20efea0616a8e6334140b69dfd7d76317983e6c18b7d384b7c2c9faa3b664655dd5bcd4217d47776b1f36ce394710bc3e5113d1ad532a786665f7b49f1

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 72774800e0d303d13ec4a961adf3d57b
SHA1 a37fc0903ec1aca9ac6ffc98fc8616ea4809aa96
SHA256 bd60e37382af6d33052daca11d0ec7508809acf33b55f8d675f8a15caf9ef5aa
SHA512 53d3debe2fe9ee9d0c915167651baf851c0296ef965ca960dc68c36fad82231108498b965843cb232e7d3cd641861ceac0ed1dd1541a46fbd33cb3fe92c655db

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\js\index-dir\the-real-index~RFe58502e.TMP

MD5 12e34c6757dcd4471389725013ce16c3
SHA1 3868121ed99553144e3deb1c79f2f6bec53bbecf
SHA256 89a66b04590363cba8cc702f9b3f4db7c260df90d37ac9da0c85f83ba722a97c
SHA512 2a533b28d40877b85b4ed8abb1c9a1f5f6b4056f2a37f0026439c8f45fc17e8b6a88d25a3fb60de558a1aec69b8441e35fd1198d99086765897a7230c5f1f1ea

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\js\index-dir\the-real-index

MD5 3195e1ff746fb26e3009d4c8b5d15e6e
SHA1 53288f84ea58b90a343c155f54029461da500b22
SHA256 5886bb563d6b1feaf031031ac7537713835f5d6f1d49e6123e3897f2be8cef6d
SHA512 a52fe05fe77dd8150592f2c73f66dd43f49a81516d96dad49434f960d48fccc1d04a9bd7c09822e004f44e27cdadf8f99f6b288bf74b35f4446ba3c59327cb4f

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

MD5 f27270cc7fdbf1de8b95be42c8b03774
SHA1 60a57be851ba90f083aeca3eedf512581c8f1116
SHA256 38f1cd078ce879eb6ece2de5d1df98e3fdbb39e90da8e6bf07204e53ab9f9f6e
SHA512 810a66a6ddac8a0a8890ac2426c1ce355ce1af6fd8efc10fa8fe6a8c8b8d7e02fd29cceba7eacd45b1c9916001e346ca120fe7374b69964e29898a1eae466f6c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 e222c06645552d7da3dc8ecb7edf7798
SHA1 7610b121303c36d4aa66348ec92782d3f112be5e
SHA256 2e70b5aa9774013e0156121f3e34f91481c5802d4b1313d42c007f7e3a2f02f9
SHA512 407484e3aceb2e0c5dd61569fc1990ade0404a873b8b8a203099b0c5a5fc792fb22ec49d263abf98aee53b2025c43e027bd35b880266a19fbf0ba8a8c0691719

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 8627de26ab0b8f386a8a9c36841254a5
SHA1 6cb4bbba0cacab00d31d3516b399d14296f9ef9d
SHA256 9661fc1e314c782fb0771311463ca120fe10b03931fbef2d5232524301a0920a
SHA512 c15abb13c02e74b51b5aebe8d1a635053862663ad0b0cd109ddf5d4b6c35c3a3c25eed47cf6ee629f3ce6cdcb7b3da9e2c59b9d90fead5f6839a1797262b99c7

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\Network Persistent State

MD5 5fb7b8ec24483add824c42ac30c08164
SHA1 616de32a9a44b6e4c147255b9aa41a1737b20b19
SHA256 66bd1af59c7caeba9938d8c20d36d5dcbb7bf325005833fabb36e99b91a58eba
SHA512 579b3952ec636b0e86f542d4f3db3d140aad871a3dc67c78815c7be2747486e023a11096a2c866365b12e1eb1b81f131327251a2a380161fff947e7e0115666b

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 2bb1a30f2f691e01d1ec1475bb4a3b61
SHA1 708503fd6596deede46666ce1f594413c611c792
SHA256 11e5f5920f36bdf214e64c25752951dbe03e9eb4a81a27abf2f55eb56c3c72b4
SHA512 1eebd33b4a4e482cec91c344e83203fc6195872ae70d06ec934816453342a7ceb67380d6b6cf582fe3a5cf6cb484136a7cb107b746fa4de234ac0a65bde84332

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 1947475b38a4d761d23cfee9e86f9a63
SHA1 4798b93027db851de793fd5a230745762123c8b9
SHA256 430e7f4ea34f9e091a9301357a18da09f10aacae10fb9065940c126c14c3b685
SHA512 331ed727b352b9cd19886dd264abe8fd038a6a3a1a77ed176059eefcb0a09fc47da44ac1e96d8e012a211fb76489cbe397a3ac666d1318f2dbb812e705f58a89

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 e964dd4ba6c695cf755da1cefe938029
SHA1 402e85e487bfb38a58b2e04f0f360cb97bb09707
SHA256 2b24ea447a55bafd1b7a2b06e7ed675ca02e7cd47271a451362d759cdfdf4cfc
SHA512 c41c723edde04e59c297c7719ee9fc49bbcb4d4747462d31b1b61eafd6e838c823c275f9de97617677233961f1fcfa472d1f08a66131468b87169d2afdf171cb

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 76c75ee5b3ecaea9ed67720b9ddfdd7b
SHA1 5e0602d65ee9a15c782b98d6dd247ee4e74f25b5
SHA256 0fe4591847a52573fc0edf9baec76c2bf7bc0d3ae9103560b99bb7182c0957d5
SHA512 1400630cc1643bc50aa431e3f31d0b3f7392e938830403bfdaeb3b6ca560ab76703e9e0d68dec9e3faf04b82b7c21e21baa6a67296f7084bbea910e5af6162da

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-08 13:41

Reported

2024-11-08 13:43

Platform

win7-20241010-en

Max time kernel

146s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

Fabookie family

fabookie

GCleaner

loader gcleaner

Gcleaner family

gcleaner

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

OnlyLogger

loader onlylogger

Onlylogger family

onlylogger

PrivateLoader

loader privateloader

Privateloader family

privateloader

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

SectopRAT

trojan rat sectoprat

SectopRAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Sectoprat family

sectoprat

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

OnlyLogger payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09519161cb25021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09519161cb25021.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat0902ab982e32902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat0902ab982e32902.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09ac626c3b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09ac626c3b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat096d657bea7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat096d657bea7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09f2a9604ddb0ce.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09f2a9604ddb0ce.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09fad3e269114b07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09fad3e269114b07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat0902ab982e32902.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-1KUH4.tmp\Sat0902ab982e32902.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-1KUH4.tmp\Sat0902ab982e32902.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-1KUH4.tmp\Sat0902ab982e32902.tmp N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A pastebin.com N/A N/A
N/A pastebin.com N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Looks up geolocation information via web service

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09519161cb25021.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat096d657bea7.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat0902ab982e32902.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09ac626c3b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09fad3e269114b07.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-1KUH4.tmp\Sat0902ab982e32902.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09f2a9604ddb0ce.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09c148600d822e438.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09f1ff9181e817b86.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2860 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe
PID 2860 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe
PID 2860 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe
PID 2860 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe
PID 2860 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe
PID 2860 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe
PID 2860 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe
PID 2804 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1680 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2748 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1516 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1828 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1828 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1828 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1828 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1828 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1828 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1828 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 2040 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2804 wrote to memory of 1164 N/A C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe

"C:\Users\Admin\AppData\Local\Temp\1bcd1d1521d0879173fb5adfd51fad8b9100524dd6f46f79af757d8b4dc00c15.exe"

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09f1ff9181e817b86.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat096d657bea7.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat091ac9063af7.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09ac626c3b.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat0902ab982e32902.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09f2a9604ddb0ce.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09b5258b63.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09c148600d822e438.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09519161cb25021.exe /mixone

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Sat09fad3e269114b07.exe

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09f1ff9181e817b86.exe

Sat09f1ff9181e817b86.exe

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09519161cb25021.exe

Sat09519161cb25021.exe /mixone

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09c148600d822e438.exe

Sat09c148600d822e438.exe

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat0902ab982e32902.exe

Sat0902ab982e32902.exe

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat091ac9063af7.exe

Sat091ac9063af7.exe

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe

Sat09b5258b63.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat096d657bea7.exe

Sat096d657bea7.exe

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09ac626c3b.exe

Sat09ac626c3b.exe

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09f2a9604ddb0ce.exe

Sat09f2a9604ddb0ce.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 444

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09fad3e269114b07.exe

Sat09fad3e269114b07.exe

C:\Users\Admin\AppData\Local\Temp\is-1KUH4.tmp\Sat0902ab982e32902.tmp

"C:\Users\Admin\AppData\Local\Temp\is-1KUH4.tmp\Sat0902ab982e32902.tmp" /SL5="$7014C,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat0902ab982e32902.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 440

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 960

Network

Country Destination Domain Proto
US 8.8.8.8:53 hsiens.xyz udp
NL 45.133.1.182:80 tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 www.listincode.com udp
N/A 127.0.0.1:49284 tcp
N/A 127.0.0.1:49286 tcp
US 52.203.72.196:443 www.listincode.com tcp
US 54.205.158.59:443 www.listincode.com tcp
US 8.8.8.8:53 safialinks.com udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.2.46:443 iplogger.org tcp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.135.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 guidereviews.bar udp
US 8.8.8.8:53 c.pki.goog udp
GB 172.217.16.227:80 c.pki.goog tcp
US 8.8.8.8:53 auto-repair-solutions.bar udp
US 8.8.8.8:53 onepremiumstore.bar udp
US 8.8.8.8:53 premium-s0ftwar3875.bar udp
US 104.26.2.46:443 iplogger.org tcp
US 104.26.2.46:443 iplogger.org tcp
FI 65.108.20.195:6774 tcp
US 8.8.8.8:53 mas.to udp
US 104.21.11.154:443 mas.to tcp
US 8.8.8.8:53 best-link-app.com udp
US 8.8.8.8:53 www.iyiqian.com udp
SG 13.251.16.150:80 www.iyiqian.com tcp
NL 45.133.1.107:80 tcp
FI 65.108.20.195:6774 tcp
US 8.8.8.8:53 pastebin.com udp
US 104.20.4.235:443 pastebin.com tcp
US 8.8.8.8:53 wfsdragon.ru udp
US 172.67.133.215:80 wfsdragon.ru tcp
FR 51.178.186.149:80 tcp
FI 65.108.20.195:6774 tcp
FI 65.108.20.195:6774 tcp
FI 65.108.20.195:6774 tcp
FI 65.108.20.195:6774 tcp
FI 65.108.20.195:6774 tcp

Files

\Users\Admin\AppData\Local\Temp\7zSC2B613B7\setup_install.exe

MD5 d2239d3a25f407500c2361f15e5e8c16
SHA1 33f770c7625323f52e2e2b20c112a67c14ead346
SHA256 31031b7a03407df072e1e553d5b2a8dabdb2463de7c5818c1f710ab4cc3a0f23
SHA512 ae507fc49a50d2766ad4ef2dd08605652e385ed681f1ce59b417e8bd493df1de3b1acda75bdbe8c6f46b292ecd1a6e56906f47a88c36708b1de5c8ecf2cacd11

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

memory/2804-48-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

memory/2804-50-0x000000006B440000-0x000000006B4CF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

memory/2804-63-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2804-64-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2804-62-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2804-61-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2804-60-0x000000006494A000-0x000000006494F000-memory.dmp

memory/2804-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat091ac9063af7.exe

MD5 535ae8dbaa2ab3a37b9aa8b59282a5c0
SHA1 cb375c45e0f725a8ee85f8cb37826b93d0a3ef94
SHA256 d838cfaf7b197d6c3379e2c5daf269cc422a09df556de6ca08fe174b4906b3b6
SHA512 6be6a3d8fa5d1fb17f85bdacf873280a3a074739fb68037de1a50c63d2d24e5b6b3ffabb838c3097ff9840ed27391a3fb812c802010ca3db860414c34123867c

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09c148600d822e438.exe

MD5 aae5a96fdb4dacba841f37cd6bd287e9
SHA1 ea00eeac88b11452e092b9f3cc1e5833a8d83045
SHA256 a64a3914b2b41dc192b1d792e6dc4c6dbae56d106f0940f3f7a49c5f4b00c56e
SHA512 d9846063a78b8e90bd5d42fc907b3410414eb2df7fc47a57a8467d7d8bb51307cd3a492dee7e3d735e7841829751dd4309ffa44651a098cdb7d4fb051ed7712c

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09f1ff9181e817b86.exe

MD5 67f7840ff079c52e311eca9580366cd1
SHA1 738525b29615c29801ecb22ba5007e7b83c2b2d4
SHA256 0898bf93856be4b31058da24084d84a0a944f333f06e05f83c40b668bb96d127
SHA512 fd97b08862aa4667639c5722f3f39f9e8079ac180447e65fc019efccced51a3a75781918a6b47c3d246bca3671618314814260a4dcdcc3d00c64f576a46f13d1

\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09519161cb25021.exe

MD5 71d5b0cc31391922fc05e15293ecc772
SHA1 4057b118de7e9c58b71a43730af4ae2a4e7cc634
SHA256 3861370b4a6e7a5a84759a14a851c15714757115d9f689e65a93d9285b356995
SHA512 2a6a75e1cf2222fa8f3554ba16a3cb6bef4b4db0a31c0f17bb19580064ce318956ac58d6d44e06e60b45009935edf7597e69f500ef581bfe0f44c9929b602cf2

memory/2524-101-0x0000000000830000-0x0000000000838000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09f2a9604ddb0ce.exe

MD5 5a2353aae7d8538d5ed0ee486330d396
SHA1 9246c223f1a4091197c6afa4c48097480ac8ff34
SHA256 d2c456164b7e39ed8c3132d7d38ed88d91cfaceb7ec111cffaef48b8ef03c288
SHA512 f4df8c52af12369bab744a5c30ab95b236396b24437fcd065efaeb5b623f1c5d2b783fc10923c3b39ef0105fb6a4e352239707305f71676aa023160603c7e964

\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09ac626c3b.exe

MD5 afd579297cd579c417adbd604e5f6478
SHA1 ddcc76ddd8c41c93b7826338662e29e09465baa4
SHA256 64eab369a17ac181e0ce8236e1e971cec2fd07db21a28d220c6ed99ea34aed6c
SHA512 f468a39f0b6d15c4153207556c00e8e97ae61cd856e548ec7f0650e72ac50e240ffed7246f60ad0c5e8632bf7164611dadbccd18e7164e959b4b4d02f78df02e

\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat096d657bea7.exe

MD5 2fa10132cfbce32a5ac7ee72c3587e8b
SHA1 30d26416cd5eef5ef56d9790aacc1272c7fba9ab
SHA256 cfb5c20ec8d95c35f7edb8743084d4491e43c62c575cf0102b4f6781c50689de
SHA512 4e9338f89229bdddb5d7c803a415a338a75962e61ef47984a67efd1e81824ac14039d9abe2b26992a30f6d26c724058518849d71b6d1948c00b08ae95b0fd25a

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09b5258b63.exe

MD5 10e384c9b18deb8bd24531d6e88d3a1b
SHA1 55a8924419e58828645a41f4135b6bf3c7f33b70
SHA256 207a0bebf93a483cf8df67d5dcd7414ebaca95a1509e051ab685d55413e7d89b
SHA512 519b6fa3413828895353d7d2714a2835b37ca5d0d861cfd8c56e8f0409d8fac8e156f7ec4653af26805f732547718a6e16dae909c7a734ff5e775091b24e414c

memory/2280-98-0x0000000000400000-0x000000000046D000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat0902ab982e32902.exe

MD5 210ee72ee101eca4bcbc50f9e450b1c2
SHA1 efea2cd59008a311027705bf5bd6a72da17ee843
SHA256 ccecc31183a26f9949252d33a8207f4e3ddb5a38fa1fbcbd22d7521942a40669
SHA512 8a6eacb4fb610ffb9457025e031824167a5cc6abe4f25168022ead62f6735b43a5e0f72a11d3efdb590f4f583d382d094789530d219113654d1db76c4be50a05

C:\Users\Admin\AppData\Local\Temp\7zSC2B613B7\Sat09fad3e269114b07.exe

MD5 05df98ef620b4a298719148c502388bd
SHA1 1d909bd5f9d976654ab42360f4aba4b232d1575a
SHA256 bd0dbf1d4573f97acaeb4c9faacb7af147b9b75201b86e44f4a0cd429fa65be4
SHA512 db20bdae1a21b231c754d6a16045c7a85051d8999d1f73790a34784cbf06ba2efec310129acca8fac607b2111178d06143e7e920c5bb859750ef504d1e8b7f0b

memory/2804-70-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2804-69-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2804-68-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2804-67-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2804-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2804-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2244-125-0x0000000001240000-0x0000000001270000-memory.dmp

memory/2244-126-0x00000000003D0000-0x00000000003D6000-memory.dmp

memory/2804-127-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2804-144-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2804-139-0x0000000000400000-0x000000000051B000-memory.dmp

memory/2804-143-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/2804-142-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2804-141-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1168-145-0x0000000000810000-0x0000000000836000-memory.dmp

memory/1168-146-0x0000000000A70000-0x0000000000A94000-memory.dmp

memory/952-147-0x0000000000400000-0x00000000004A5000-memory.dmp

memory/2280-149-0x0000000000400000-0x000000000046D000-memory.dmp

memory/1136-148-0x0000000000400000-0x00000000004CC000-memory.dmp

memory/1168-165-0x0000000000400000-0x00000000004C6000-memory.dmp

memory/3008-166-0x0000000000400000-0x0000000000518000-memory.dmp

memory/2280-171-0x0000000000400000-0x000000000046D000-memory.dmp

memory/1148-170-0x0000000000400000-0x0000000000516000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabD6EE.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

memory/2804-187-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/2804-192-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2804-191-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2804-190-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2804-189-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2804-183-0x0000000000400000-0x000000000051B000-memory.dmp

memory/3008-182-0x0000000000400000-0x0000000000518000-memory.dmp