Malware Analysis Report

2024-11-13 16:50

Sample ID 241108-sne2ssvblb
Target d591818f6fb84db3add31f0613e5cd32d12bf270f48d5da2b3d6369c555da214
SHA256 d591818f6fb84db3add31f0613e5cd32d12bf270f48d5da2b3d6369c555da214
Tags
fabookie gcleaner nullmixer onlylogger socelars vidar aspackv2 discovery dropper execution loader spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d591818f6fb84db3add31f0613e5cd32d12bf270f48d5da2b3d6369c555da214

Threat Level: Known bad

The file d591818f6fb84db3add31f0613e5cd32d12bf270f48d5da2b3d6369c555da214 was found to be: Known bad.

Malicious Activity Summary

fabookie gcleaner nullmixer onlylogger socelars vidar aspackv2 discovery dropper execution loader spyware stealer

Detect Fabookie payload

NullMixer

Fabookie family

Socelars payload

Socelars

OnlyLogger

Onlylogger family

Vidar family

GCleaner

Gcleaner family

Nullmixer family

Fabookie

Vidar

Socelars family

Vidar Stealer

OnlyLogger payload

Command and Scripting Interpreter: PowerShell

Executes dropped EXE

Loads dropped DLL

ASPack v2.12-2.42

Reads user/profile data of web browsers

Checks computer location settings

Legitimate hosting services abused for malware hosting/C2

Looks up geolocation information via web service

Accesses 2FA software files, possible credential harvesting

Checks installed software on the system

Drops Chrome extension

Looks up external IP address via web service

Drops file in Program Files directory

Program crash

Browser Information Discovery

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Unsigned PE

Checks processor information in registry

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

Checks SCSI registry key(s)

Script User-Agent

Kills process with taskkill

Suspicious use of AdjustPrivilegeToken

Modifies system certificate store

Suspicious behavior: EnumeratesProcesses

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-08 15:16

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-08 15:16

Reported

2024-11-08 15:18

Platform

win10v2004-20241007-en

Max time kernel

53s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

Fabookie family

fabookie

GCleaner

loader gcleaner

Gcleaner family

gcleaner

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

OnlyLogger

loader onlylogger

Onlylogger family

onlylogger

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

OnlyLogger payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\setup_installer.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses 2FA software files, possible credential harvesting

spyware stealer

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ip-api.com N/A N/A
N/A ipinfo.io N/A N/A

Looks up geolocation information via web service

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\SmartPDF\unins000.dat C:\Users\Admin\AppData\Local\Temp\is-7051M.tmp\Thu162f05ff69c.tmp N/A
File created C:\Program Files (x86)\SmartPDF\is-TEPVL.tmp C:\Users\Admin\AppData\Local\Temp\is-7051M.tmp\Thu162f05ff69c.tmp N/A
File opened for modification C:\Program Files (x86)\SmartPDF\unins000.dat C:\Users\Admin\AppData\Local\Temp\is-7051M.tmp\Thu162f05ff69c.tmp N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1682dd72002d.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-M6D5G.tmp\Thu16f1bb7b9d.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\xcopy.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1682dd72002d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu162f05ff69c.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1603650aaf956dc3.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16bd6a3899e6631eb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f1bb7b9d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-7051M.tmp\Thu162f05ff69c.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1682dd72002d.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1682dd72002d.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1682dd72002d.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16bd6a3899e6631eb.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16bd6a3899e6631eb.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Windows\SysWOW64\xcopy.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16955bd58fe3.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1685a3be08acb.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu165d02e803.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3052 wrote to memory of 4548 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe
PID 3052 wrote to memory of 4548 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe
PID 3052 wrote to memory of 4548 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe
PID 4548 wrote to memory of 4868 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4868 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4868 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 2744 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4404 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4404 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4404 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4472 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4472 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4472 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 1064 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 1064 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 1064 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4216 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4216 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4216 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 2408 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 1088 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 1088 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 1088 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 2820 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4548 wrote to memory of 1672 N/A C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2744 wrote to memory of 3868 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1685a3be08acb.exe
PID 2744 wrote to memory of 3868 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1685a3be08acb.exe
PID 2408 wrote to memory of 1876 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe
PID 2408 wrote to memory of 1876 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe
PID 2408 wrote to memory of 1876 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe
PID 4472 wrote to memory of 1648 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1682dd72002d.exe
PID 4472 wrote to memory of 1648 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1682dd72002d.exe
PID 4472 wrote to memory of 1648 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1682dd72002d.exe
PID 1672 wrote to memory of 2868 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16955bd58fe3.exe
PID 1672 wrote to memory of 2868 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16955bd58fe3.exe
PID 4552 wrote to memory of 3532 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1624e2ea3e09f6.exe
PID 4552 wrote to memory of 3532 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1624e2ea3e09f6.exe
PID 1064 wrote to memory of 800 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
PID 1064 wrote to memory of 800 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
PID 1064 wrote to memory of 800 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe
PID 4216 wrote to memory of 4992 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu165d02e803.exe
PID 4216 wrote to memory of 4992 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu165d02e803.exe
PID 4404 wrote to memory of 1292 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu162f05ff69c.exe
PID 4404 wrote to memory of 1292 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu162f05ff69c.exe
PID 4404 wrote to memory of 1292 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu162f05ff69c.exe
PID 1088 wrote to memory of 2092 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16bd6a3899e6631eb.exe
PID 1088 wrote to memory of 2092 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16bd6a3899e6631eb.exe
PID 1088 wrote to memory of 2092 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16bd6a3899e6631eb.exe
PID 2820 wrote to memory of 5100 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1603650aaf956dc3.exe
PID 2820 wrote to memory of 5100 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1603650aaf956dc3.exe

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu1685a3be08acb.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu162f05ff69c.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu1682dd72002d.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu167e7760aad196df0.exe /mixone

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu165d02e803.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu1624e2ea3e09f6.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu16f15c2b41d26eb.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu16f1bb7b9d.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu16bd6a3899e6631eb.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu1603650aaf956dc3.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu16955bd58fe3.exe

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1685a3be08acb.exe

Thu1685a3be08acb.exe

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe

Thu167e7760aad196df0.exe /mixone

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1624e2ea3e09f6.exe

Thu1624e2ea3e09f6.exe

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu165d02e803.exe

Thu165d02e803.exe

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16bd6a3899e6631eb.exe

Thu16bd6a3899e6631eb.exe

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe

Thu16f15c2b41d26eb.exe

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1603650aaf956dc3.exe

Thu1603650aaf956dc3.exe

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1682dd72002d.exe

Thu1682dd72002d.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f1bb7b9d.exe

Thu16f1bb7b9d.exe

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16955bd58fe3.exe

Thu16955bd58fe3.exe

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu162f05ff69c.exe

Thu162f05ff69c.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4548 -ip 4548

C:\Users\Admin\AppData\Local\Temp\is-7051M.tmp\Thu162f05ff69c.tmp

"C:\Users\Admin\AppData\Local\Temp\is-7051M.tmp\Thu162f05ff69c.tmp" /SL5="$B0048,138429,56832,C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu162f05ff69c.exe"

C:\Users\Admin\AppData\Local\Temp\is-M6D5G.tmp\Thu16f1bb7b9d.tmp

"C:\Users\Admin\AppData\Local\Temp\is-M6D5G.tmp\Thu16f1bb7b9d.tmp" /SL5="$10002C,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f1bb7b9d.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 524

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1648 -ip 1648

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 360

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 624

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 624

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 748

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 788

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 732

C:\Windows\SysWOW64\xcopy.exe

xcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 852

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 1080

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 1088

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 1336

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 800 -ip 800

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc6cbdcc40,0x7ffc6cbdcc4c,0x7ffc6cbdcc58

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 1536

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2336,i,3972769307522261715,4589239839258147837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2344 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --field-trial-handle=1884,i,3972769307522261715,4589239839258147837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2444 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --field-trial-handle=1956,i,3972769307522261715,4589239839258147837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2564 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,3972769307522261715,4589239839258147837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,3972769307522261715,4589239839258147837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3144,i,3972769307522261715,4589239839258147837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3560 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3568,i,3972769307522261715,4589239839258147837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3692 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{yXln-x1LvJ-fWdE-gfkgK}\25551705736.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{yXln-x1LvJ-fWdE-gfkgK}\43406283598.exe" /mix

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{yXln-x1LvJ-fWdE-gfkgK}\47830521198.exe" /mix

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4756,i,3972769307522261715,4589239839258147837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3932 /prefetch:1

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 1964

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "Thu167e7760aad196df0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe" & exit

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 800 -ip 800

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 844

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "Thu167e7760aad196df0.exe" /f

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5280,i,3972769307522261715,4589239839258147837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5312 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 hsiens.xyz udp
US 8.8.8.8:53 www.listincode.com udp
US 54.209.42.5:443 www.listincode.com tcp
US 8.8.8.8:53 safialinks.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 best-link-app.com udp
US 8.8.8.8:53 ipinfo.io udp
US 8.8.8.8:53 233.129.159.162.in-addr.arpa udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 34.117.59.81:80 ipinfo.io tcp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 remotenetwork.xyz udp
US 34.117.59.81:443 ipinfo.io tcp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 startupmart.bar udp
US 8.8.8.8:53 best-supply-link.xyz udp
US 8.8.8.8:53 2no.co udp
US 104.21.79.229:443 2no.co tcp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 81.59.117.34.in-addr.arpa udp
US 8.8.8.8:53 activityhike.com udp
US 8.8.8.8:53 proxycheck.io udp
US 104.26.9.187:80 proxycheck.io tcp
US 104.21.79.229:443 2no.co tcp
US 8.8.8.8:53 c115ccef-fcb1-4039-a9a5-8e09a6993f8d.s3.eu-west-2.amazonaws.com udp
GB 52.95.150.86:80 c115ccef-fcb1-4039-a9a5-8e09a6993f8d.s3.eu-west-2.amazonaws.com tcp
GB 52.95.150.86:80 c115ccef-fcb1-4039-a9a5-8e09a6993f8d.s3.eu-west-2.amazonaws.com tcp
US 3.225.234.52:443 www.listincode.com tcp
US 8.8.8.8:53 229.79.21.104.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 187.9.26.104.in-addr.arpa udp
US 8.8.8.8:53 86.150.95.52.in-addr.arpa udp
US 8.8.8.8:53 gheorghip.tumblr.com udp
US 74.114.154.22:443 gheorghip.tumblr.com tcp
US 8.8.8.8:53 22.154.114.74.in-addr.arpa udp
US 8.8.8.8:53 23.149.64.172.in-addr.arpa udp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 233.38.18.104.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 iplogger.org udp
US 8.8.8.8:53 cleaner-partners.biz udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 46.3.26.104.in-addr.arpa udp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
US 8.8.8.8:53 227.187.250.142.in-addr.arpa udp
N/A 127.0.0.1:62297 tcp
N/A 127.0.0.1:62300 tcp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 cleaner-partners.biz udp
DE 162.55.179.90:80 tcp
UA 194.145.227.161:80 194.145.227.161 tcp
US 8.8.8.8:53 www.iyiqian.com udp
SG 13.251.16.150:80 www.iyiqian.com tcp
US 8.8.8.8:53 161.227.145.194.in-addr.arpa udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 secure.facebook.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
GB 163.70.147.35:443 www.facebook.com tcp
GB 163.70.147.35:443 www.facebook.com tcp
GB 163.70.151.14:443 secure.facebook.com tcp
DE 162.55.179.90:80 tcp
GB 163.70.147.35:443 www.facebook.com udp
US 104.26.3.46:80 iplogger.org tcp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 150.16.251.13.in-addr.arpa udp
US 8.8.8.8:53 35.147.70.163.in-addr.arpa udp
US 8.8.8.8:53 14.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 234.187.250.142.in-addr.arpa udp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
US 8.8.8.8:53 21.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
GB 163.70.151.21:443 static.xx.fbcdn.net udp
GB 163.70.151.21:443 static.xx.fbcdn.net udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 content-autofill.googleapis.com udp
GB 216.58.212.202:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 202.212.58.216.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 facebook.com udp
GB 163.70.151.35:443 facebook.com tcp
US 8.8.8.8:53 35.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 68.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
GB 216.58.212.202:443 content-autofill.googleapis.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
GB 163.70.151.35:443 facebook.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
GB 163.70.151.21:443 static.xx.fbcdn.net udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 staticimg.youtuuee.com udp

Files

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\setup_install.exe

MD5 08eebacc710285f112d456fb556dbc10
SHA1 a816b9c43ba56708955f2cae45134dd3bf6e424d
SHA256 45157c321a80609c4585cfc044979d524db6c00ad15664d626f6a1956d1d5f32
SHA512 6ef21f52613f8dfd752abc2aab21fa937954c31346448f24a3f924120c4aca471f9d1c7464f583ebed00def1a181683358f9cea6af472768faf7526a82f83b49

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

memory/4548-60-0x0000000064940000-0x0000000064959000-memory.dmp

memory/4548-66-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/4548-65-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu167e7760aad196df0.exe

MD5 3a9115aa34ddc3302fe3d07ceddd4373
SHA1 10e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256 080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA512 85fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16955bd58fe3.exe

MD5 f75305acc33c08e43f7bba73b0adfb0b
SHA1 93edf0bf57d39a79e89fed208ca0a0e65356f542
SHA256 3e737690e143e28ad6acc866fe2eff94f9084ace48b40687eff354256ceb2c66
SHA512 3d8eb705bc7745c91e42dd8a06066c182ced8d0ee514ed949ff3e083b33fe084e7b2fced7c355805f81f4aae93540a26b25b956ccf2d5cf4a12184ea25954392

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1603650aaf956dc3.exe

MD5 a1c7ed2563212e0aba70af8a654962fd
SHA1 987e944110921327adaba51d557dbf20dee886d5
SHA256 a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA512 60d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16bd6a3899e6631eb.exe

MD5 d80cd22e3948dbbf2b11e84cc6179d82
SHA1 641691190bca3998148c8b19f17357baeb7d9bcd
SHA256 299b3ce525750db5dc8d7638966025cf0d0169e386dc0e5514d8dca3509c137f
SHA512 f4f0513d483c72450e67d29fed4a69664357984f8908e4ac95b969ab21d655946c13607daccadb89fcf663b856e2fccabfc8552fd9951c9a1c0441a21f8d8ef3

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f1bb7b9d.exe

MD5 b160ce13f27f1e016b7bfc7a015f686b
SHA1 bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256 fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA512 9578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu16f15c2b41d26eb.exe

MD5 bac81e523c07dbf26d83e730af2940f8
SHA1 a34e9eb9578c3a26f24d6a5a534d1ddc39d55897
SHA256 8b67520efec54d44d25e03611fc76c66560d5daf7504d72e5cd2a96a580c0bc1
SHA512 3679790714d9536323fb3d7073a60ab7239983e31c67fabd4a874623016f9bb36bd94160b20c9e696969a49f3b877e7b5a03cfc29c78753fbd5d1eb6f7f434be

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1624e2ea3e09f6.exe

MD5 5af7bc821a1501b38c4b153fa0f5dade
SHA1 467635cce64ae4e3ce41d1819d2ec6abdf5414f3
SHA256 773f2e6660cc3a2b3bb55c0b88a74d24db0dfc5c0cef7c5b13ec9aac48f5d6b6
SHA512 53fd58565d6ca16fc9ca7113cd90657ef8c09fa2efcc9603f6da5c2a3050aaeb1d8edfc46b2b40d80b44a8ccce27d9e4fc6bac62bac236fdc360ebdab3b5c146

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu165d02e803.exe

MD5 b9d6fa9af107c8f185fa981e9365a3ec
SHA1 77b4459537959d478a4dc9ba64c80d44a278f679
SHA256 37b758e9d8ac0212bde2acff6c6a1d53f0bfcc202f2d129a7ee4e0a4dcac3770
SHA512 a9c631b58686dd0b86c95046709d667fae31dddd7a74b62235840d67d2aa4b2ce1cdc235f87d151c880137ee7d69cb934dc6239aada7de9b532b331b9e54b090

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1682dd72002d.exe

MD5 416392dae28120d0cb8868aed33e5765
SHA1 bb4661be43536658ca109757cebe18ca13f17b98
SHA256 d902fa8f486a828b78882393eda791dd9798327cc9fb2db790a8b566a1e45ace
SHA512 4701eefcaf54fd2abcf121374885498678d83bb527d914fdbdb71582b15f2828a6135c266324e308a4f3984ccc95d6c1ee2b18845489825e63f011348eb0c4c9

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu162f05ff69c.exe

MD5 45d1381f848b167ba1bca659f0f36556
SHA1 bb282731c8f1794a5134a97c91312b98edde72d6
SHA256 8a1b542e56cf75216fcd1d1dd4bf379b8b4e7a473785013d5fbf6ce02dbdcf28
SHA512 a7171f37ae4612cda2c66fece92deea537942697b4580f938cdd9d07d445d89bac193e934569141fe064355b2a5e675aaa5c348298d96ff1e13dbe01732eeb0f

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\Thu1685a3be08acb.exe

MD5 bb3d37652e1977e1b48593f9b6e3f28e
SHA1 c6e34e278834692c6f04ec89cb7d9a5cd07a88b3
SHA256 1ebf7ca7b712fbf64686d8be3aea17cf96d6382795e59bcc21085430fe0d8071
SHA512 7c06c7d058cc2dff00f2457cee775471c9477c68ea1e841c852367bee767aa0cc5a1598709101eeb2c9d1e0710943db5b9d30ebd8187bed414cfc7953cd95569

memory/4548-64-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4548-63-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4548-62-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4548-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4548-59-0x0000000064941000-0x000000006494F000-memory.dmp

memory/4548-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4548-57-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4548-56-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4548-55-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4548-53-0x0000000000770000-0x00000000007FF000-memory.dmp

memory/4548-52-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4548-51-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

C:\Users\Admin\AppData\Local\Temp\7zSCEBB5567\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

memory/3868-95-0x0000000000280000-0x00000000002AC000-memory.dmp

memory/4940-93-0x0000000000400000-0x000000000046D000-memory.dmp

memory/2868-92-0x00000000005C0000-0x00000000005C8000-memory.dmp

memory/1292-87-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4992-100-0x0000015E854B0000-0x0000015E85638000-memory.dmp

memory/3868-104-0x0000000002200000-0x0000000002206000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-7051M.tmp\Thu162f05ff69c.tmp

MD5 ffcf263a020aa7794015af0edee5df0b
SHA1 bce1eb5f0efb2c83f416b1782ea07c776666fdab
SHA256 1d07cfb7104b85fc0dffd761f6848ad176117e146bbb4079fe993efa06b94c64
SHA512 49f2b062adfb99c0c7f1012c56f0b52a8850d9f030cc32073b90025b372e4eb373f06a351e9b33264967427b8174c060c8a6110979f0eaf0872f7da6d5e4308a

memory/4992-102-0x0000015E859E0000-0x0000015E859F0000-memory.dmp

memory/2924-101-0x0000000002CA0000-0x0000000002CD6000-memory.dmp

memory/2924-107-0x00000000054E0000-0x0000000005B08000-memory.dmp

memory/2340-118-0x0000000003A80000-0x0000000003ABC000-memory.dmp

memory/3868-120-0x0000000002230000-0x0000000002236000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-JSQL3.tmp\itdownload.dll

MD5 d82a429efd885ca0f324dd92afb6b7b8
SHA1 86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea
SHA256 b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3
SHA512 5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

C:\Users\Admin\AppData\Local\Temp\is-M6D5G.tmp\Thu16f1bb7b9d.tmp

MD5 6020849fbca45bc0c69d4d4a0f4b62e7
SHA1 5be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256 c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512 f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb

memory/3868-106-0x0000000002210000-0x0000000002232000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-P5JMG.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

C:\Users\Admin\AppData\Local\Temp\is-P5JMG.tmp\idp.dll

MD5 8f995688085bced38ba7795f60a5e1d3
SHA1 5b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256 203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512 043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

memory/4992-129-0x0000015EA1F60000-0x0000015EA1FE4000-memory.dmp

memory/2924-130-0x0000000005340000-0x0000000005362000-memory.dmp

memory/2924-132-0x0000000005BC0000-0x0000000005C26000-memory.dmp

memory/2924-131-0x00000000053E0000-0x0000000005446000-memory.dmp

memory/2924-147-0x0000000005D30000-0x0000000006084000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ctpinpn1.pml.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2960-148-0x0000000000400000-0x0000000000516000-memory.dmp

C:\Users\Admin\AppData\Local\Module_Art\Thu165d02e803.exe_Url_kkkgvjpnnnayadd35kc0uqafdhhqjz0m\1.2.1.0\user.config

MD5 1b02b89ab3872d00c6a46cb4a7048dc9
SHA1 0840aefbbe40a00d7290d32ce8243de3cf98339e
SHA256 ac8517efbed88850a40943fbd667d9a06f6a156f0031109f59b4ca821aa22fd4
SHA512 0eeee6c2cf1eaa11d561ba17ed65caf97e069b5ccbf7420c3ae4bf88859f1273034a600da91620411b12cd3241dcfabdc8d4ddd58218f2781254ac6ccf1fa419

C:\Users\Admin\AppData\Local\Module_Art\Thu165d02e803.exe_Url_kkkgvjpnnnayadd35kc0uqafdhhqjz0m\1.2.1.0\d1bmc2yo.newcfg

MD5 8e18625cd36f0075da4bf0ce8fac8204
SHA1 0df80ad1c5ea9bddcb5cfcf2c60c6fb3db903216
SHA256 35799f5570b76aa51478e74ea9d1c42b39be157c3953a2b44047dd3ed2e629b1
SHA512 74d8be6cddfc1c13acb30c18752d93ef8d57348b8b29220914ecb126ae8459318dd150b2f51299870119bdb6483f35417baa988c688f0f621512c5a47e227c26

memory/4940-162-0x0000000000400000-0x000000000046D000-memory.dmp

C:\Users\Admin\AppData\Local\Module_Art\Thu165d02e803.exe_Url_kkkgvjpnnnayadd35kc0uqafdhhqjz0m\1.2.1.0\wmcjhpat.newcfg

MD5 d71a12b7aa02592b03878877eb133425
SHA1 899c5404464c3efed66534207d0245e0cf050488
SHA256 b44c3fa39198be28e0e723fd458eae31a5f05041926917fe11e2b265aa0cbee4
SHA512 ae0733fe01b479f4ad291ac1180ae9f9b5833fa072001c40728d9f26d4aa9e94ec0239432df16cad35c2675b41d58c6e599fbd0dbc1354d297ab8bca30cd4441

memory/4548-183-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/4548-178-0x0000000064940000-0x0000000064959000-memory.dmp

memory/4548-186-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2924-187-0x0000000006700000-0x000000000674C000-memory.dmp

memory/2924-185-0x0000000006300000-0x000000000631E000-memory.dmp

memory/4548-184-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4548-177-0x0000000000400000-0x000000000051C000-memory.dmp

memory/4548-181-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/1648-188-0x0000000000400000-0x0000000002B5B000-memory.dmp

memory/2924-191-0x000000006E450000-0x000000006E49C000-memory.dmp

memory/2924-190-0x00000000068C0000-0x00000000068F2000-memory.dmp

memory/2924-201-0x0000000006900000-0x000000000691E000-memory.dmp

memory/2924-202-0x00000000072E0000-0x0000000007383000-memory.dmp

memory/2924-203-0x0000000007C70000-0x00000000082EA000-memory.dmp

memory/2924-204-0x0000000007630000-0x000000000764A000-memory.dmp

memory/2924-205-0x00000000076B0000-0x00000000076BA000-memory.dmp

memory/2924-206-0x00000000078A0000-0x0000000007936000-memory.dmp

memory/2924-207-0x0000000007830000-0x0000000007841000-memory.dmp

memory/2924-214-0x0000000007860000-0x000000000786E000-memory.dmp

memory/2924-215-0x0000000007870000-0x0000000007884000-memory.dmp

memory/2924-216-0x0000000007960000-0x000000000797A000-memory.dmp

memory/2924-217-0x0000000007950000-0x0000000007958000-memory.dmp

memory/4992-231-0x0000015EA27C0000-0x0000015EA27F5000-memory.dmp

memory/4992-230-0x0000015EA26B0000-0x0000015EA27B2000-memory.dmp

memory/1292-233-0x0000000000400000-0x0000000000414000-memory.dmp

memory/800-229-0x0000000000400000-0x0000000002B6B000-memory.dmp

memory/2092-232-0x0000000000400000-0x0000000002BC5000-memory.dmp

memory/2340-234-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/2340-235-0x0000000003A80000-0x0000000003ABC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Login Data For Account

MD5 a182561a527f929489bf4b8f74f65cd7
SHA1 8cd6866594759711ea1836e86a5b7ca64ee8911f
SHA256 42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA512 9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 8bef3f29eb363e960afa7d6b45f5b832
SHA1 c0dd81d51b9b1bb218600689484cb4ea6c77bf8e
SHA256 fd75b3e66ce374b20ec526fc3969a8e7171033ac83891c5df855b14fcf951c97
SHA512 598dfb727320cd698af485891945ba93e187fee4469be5d032b2694e8e9640caa1f6bfab64b6dff13e352320976dd5c6e4a18893c8a57f14d96307a0963ff946

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\wasm\index

MD5 54cb446f628b2ea4a5bce5769910512e
SHA1 c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256 fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA512 8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extension Scripts\000003.log

MD5 891a884b9fa2bff4519f5f56d2a25d62
SHA1 b54a3c12ee78510cb269fb1d863047dd8f571dea
SHA256 e2610960c3757d1757f206c7b84378efa22d86dcf161a98096a5f0e56e1a367e
SHA512 cd50c3ee4dfb9c4ec051b20dd1e148a5015457ee0c1a29fff482e62291b32097b07a069db62951b32f209fd118fd77a46b8e8cc92da3eaae6110735d126a90ee

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extension Scripts\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extension Scripts\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.82.1_0\_locales\en_CA\messages.json

MD5 07ffbe5f24ca348723ff8c6c488abfb8
SHA1 6dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA256 6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA512 7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\icon.png

MD5 c8d8c174df68910527edabe6b5278f06
SHA1 8ac53b3605fea693b59027b9b471202d150f266f
SHA256 9434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512 d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json

MD5 9d21061c0fde598f664c196ab9285ce0
SHA1 b8963499bfb13ab67759048ed357b66042850cd4
SHA256 024872f1e0eb6f98dcbd6a9d47820525c03aa0480373f9e247a90a3ef8776514
SHA512 f62d333e6415be772751eeeaf154dc49012b5fc56b0d2d6276a099d658ebe10f3c5166ec02b215ae9cd05014d7435b53d14b98a20e2af83a7aa09a8babe71853

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\background.html

MD5 9ffe618d587a0685d80e9f8bb7d89d39
SHA1 8e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256 a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512 a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\aes.js

MD5 4ff108e4584780dce15d610c142c3e62
SHA1 77e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256 fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512 d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\background.js

MD5 5ebbb8ecd379b6b052dcdc92fc86071d
SHA1 5f906e818c585e2589340faef2d7589fae7a36cd
SHA256 cc3862ff96f7e944fc63753e62e2be60fc39d36aff9621af01c414affa2c2853
SHA512 90559f004e0c2e62212019f1561487548abeac6f46ad392728f148f350f7cc8348600148a4b965dc57651a0161ec1fab387a51203c0eb98083d3949154aa8f5f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\content.js

MD5 e49ff8e394c1860bc81f432e7a54320a
SHA1 091864b1ce681b19fbd8cffd7191b29774faeb32
SHA256 241ee3cf0f212f8b46ca79b96cfa529e93348bf78533d11b50db89e416bbabf3
SHA512 66c31c7c5409dfdb17af372e2e60720c953dd0976b6ee524fa0a21baaf0cf2d0b5e616d428747a6c0874ec79688915b731254de16acce5d7f67407c3ef82e891

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\jquery-3.3.1.min.js

MD5 a09e13ee94d51c524b7e2a728c7d4039
SHA1 0dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256 160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512 f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\pad-nopadding.js

MD5 0f26002ee3b4b4440e5949a969ea7503
SHA1 31fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256 282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA512 4290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\mode-ecb.js

MD5 23231681d1c6f85fa32e725d6d63b19b
SHA1 f69315530b49ac743b0e012652a3a5efaed94f17
SHA256 03164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA512 36860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\en_GB\messages.json

MD5 91f5bc87fd478a007ec68c4e8adf11ac
SHA1 d07dd49e4ef3b36dad7d038b7e999ae850c5bef6
SHA256 92f1246c21dd5fd7266ebfd65798c61e403d01a816cc3cf780db5c8aa2e3d9c9
SHA512 fdc2a29b04e67ddbbd8fb6e8d2443e46badcb2b2fb3a850bbd6198cdccc32ee0bd8a9769d929feefe84d1015145e6664ab5fea114df5a864cf963bf98a65ffd9

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\index

MD5 1457044d975fdd1a2953af485f37b834
SHA1 696463ef9d026f1908d17df192d52dd902f6dd7b
SHA256 8e6eb2f0dc2e8c674705c1d90091619c7b4592447a92f464abfce01fdb98f6d8
SHA512 0a04ef91603fccc97ecae640b3163b6dfc4ac5f430ffb0b916ddd3706733fcb575091c0b1c517fe331a671bb0cfa94447395aca8b51e9321d32762d27d80fc07

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\index

MD5 f465c7fc46a3b39d88c605cf15248a44
SHA1 53adf7dc6a5f679af4ed5952fb4e62cd828964d2
SHA256 0f6faa233d1f0b43dcbb8976f8cc3053cded63259cb5b494cf783d5c67ff0fd5
SHA512 353e0600f2b0e6eb4ef17c23a36d81a273c93cef783a4f7fc2c33d02bd2e3ff1957dd87707febbc621982b90508c287a45ddd2ec33e10bdc0983f2c65a92d4ae

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Shared Dictionary\db

MD5 491de38f19d0ae501eca7d3d7d69b826
SHA1 2ecf6fcf189ce6d35139daf427a781ca66a1eba9
SHA256 e58156bca5288238d341f5249d3b6c91ab37cef515358953b435339100d0596a
SHA512 232f5df71e8ec35e500ac81aa54a87b3523fe8a32168096a2a76f08e5c7868100b3cdc5155786ead489aac440beee3f84ffa43d226a5b709c66012923b20c696

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\CrashpadMetrics-active.pma

MD5 9a31b075da019ddc9903f13f81390688
SHA1 d5ed5d518c8aad84762b03f240d90a2d5d9d99d3
SHA256 95cf4025babcd46069b425449c98ed15d97d364b2461417caa9aa0c13cb372e1
SHA512 a04726a429ae727d685f0836327c625d2f18d6327253216a9a31265a324b68b06bec4e7f1b744d261a0e67fa0a90c43719aeda9d2998f42525b0ff5640c7bf1e

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad\settings.dat

MD5 800547b40b40a6d57a70b74809b450fa
SHA1 310a064c7ba82120f80af50892dcbe61b53f9d70
SHA256 a562ff4b14badc73b0804883bf4ccfd9972e485123de5e5949981794f66ed936
SHA512 39630e3b5069d0c66ea44069358cf01f180bf25103968f77d483a27deb7e91e796a1718ce9af2f438bebe8207537e735cd402d649e2adfa2ca7748faae2db949

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

MD5 f95635f8795c707ce3582df161709ee8
SHA1 ec5d16db8c4a8bc3f00123d1d50230af64d5ba85
SHA256 7b54d120a7af276132145f4dcec2137ab0e9164deeb7c494ee642a467c7f6df3
SHA512 739aee2ab5fd7a3d694e9de00bf435b20befb3c67bf94c479dfcecea3245a47d1f4d5389e7c7628ebc79562b3e63a32ae42a7d2bac0be71022e7cb9cc188f1fd

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Variations

MD5 961e3604f228b0d10541ebf921500c86
SHA1 6e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256 f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512 535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Last Version

MD5 ef48733031b712ca7027624fff3ab208
SHA1 da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256 c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512 ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Sync Data\LevelDB\LOG

MD5 2b99646364274118b6badd0f0d8c86fd
SHA1 d62bb1dec77da3768c00ce68f5785bf18ced3b2a
SHA256 33c84f409b3a89626fd18e2b5d1aa629a5cfd9cd4d76def6501fcf197aba8722
SHA512 bea521dc5a1f0e7572d3baa7f5fa0392b2d9d4cb1993e07c8922be03b624699a87db5d45ac684c467a9088d0bc0ab2ca65c6fd2e26625802d377550e52a941cb

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 094acdff9ddb6787ac898ff8f6afa07c
SHA1 e7648ed896dca5deab7281a7f98e425db3342f1b
SHA256 688000b161cbc20a0e4dfb281b9c0a4637600303c28743659906fb44b2ffe4f8
SHA512 aa413e725c263c1e95f6a314d1baf9ea186780e14f9a2c4d0cad3fa08dfdcf306a0e447d3ba79f08fdd9905f3ec4264a0ee37841b8068b80dc61f307c3c630bd

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\data_1

MD5 cb4cbfd81cdcac5d948f7e91db9d2f5b
SHA1 4c74df95dd0481e0792320fe0c4ca79ad75df729
SHA256 a96f653354b00c746a9420da46bff344ed1666ae8a14df881973eb28470e3b95
SHA512 8943a4a83524eadcf9d56212ab9f67d6335a31fbc6c045cafb3acaf26f18b78523905a14c6e487835d080e6b6ddcb936c2b577b76c56f19d9943c11f38ca6062

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\data_2

MD5 727ddba6c69d2e855820b57ad8a5cda7
SHA1 2d53b1c7e3ab91a0c3a33cfcf75b7d9d3bf1e202
SHA256 20b34e761ac58e4c1d3be056e0ca65e1372143e4dd4fad25c19f1f45f2e2fc19
SHA512 e3137d4f4b872046c2c0edf72b4a8f14751a2f265ae0703409a78ff2bd54f877924ec445b550e69d09171503cf47e6ddbbd341cfa7e935fb985add2545d3bc98

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\data_0

MD5 50f3b30a7b6c9b83f9f5a74050dbd3ee
SHA1 eb2ca3d41994007887099fe68409335a56c029ae
SHA256 4741e5ec153027bd957f28382ef0c4042ec9cf82d85934a90b38e2a28161881e
SHA512 f83233b0e6b377c774a99790586e89752c8820c26b97e87f3ea88655f40f2558e4ab61300b6467448adafa36086917c02ef1135cf689c4535de03945a91de3a4

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Sync Data\LevelDB\LOG.old

MD5 438e1d62639b85852cb76a33b0ee6609
SHA1 2f27638248d26032614f2c0dffc6395bb0fc2415
SHA256 2875d3e81fc299c066330b723c8352ffdc51c2e6c8eb9a950d2b8f424787ea65
SHA512 cd3b668928477c11bce19dda7acba37d4b642206aa3205680b975f99832f6de7b506ca73a41f04daf61cb318fb6f54d86936f55a7ff5f2fa65a566336273978d

C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe

MD5 6445250d234e789c0c2afe69f119e326
SHA1 03074f75c0ff50783d8c2e32d96e39b746540f66
SHA256 2e6cd9433e66a9ebde268bc6949d4660de441790bd39ffc9cb0f4caaeb44320f
SHA512 ecd094a4d026378f85435f8a2dc16c92c033aff92ba126d8bbb22d6b279b842d417f4df0f63199ea248d0ec64b9679acb5a1f835560d8e3c5b84be492cc0e68e

memory/800-1374-0x0000000000400000-0x0000000002B6B000-memory.dmp

memory/2340-1385-0x0000000000400000-0x00000000004BD000-memory.dmp

C:\ProgramData\V2IQWN42J3VPFYPV0HI1POQSH\files\temp

MD5 f310cf1ff562ae14449e0167a3e1fe46
SHA1 85c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256 e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA512 1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

C:\ProgramData\V2IQWN42J3VPFYPV0HI1POQSH\files\temp

MD5 ab87d892a202f83f7e925c5e294069e8
SHA1 0b86361ff41417a38ce3f5b5250bb6ecd166a6a1
SHA256 bdc61a1c60fe8c08fe7a5256e9c8d7ad1ba4dd0963a54357c484256fc8834130
SHA512 f9a03eaae52d7fb544047fea3ffa7d8c6f7debdbb907348adfc46545e7b6c3783427983f16885ae138e43e51eec6ce73520c38581e4d9bb7140beeae2137de41

memory/1292-1429-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2340-1407-0x0000000000400000-0x00000000004BD000-memory.dmp

C:\ProgramData\V2IQWN42J3VPFYPV0HI1POQSH\files\temp

MD5 f6246be42ff06d33a7c2ffecc87197ac
SHA1 5baaf8d19db2edf83b8a0b3e99ccbe652925a350
SHA256 2eef1daf7969121f6fbd8edcb7f2ab8485c325eec47a9f7a377c64ee1f2f2f7f
SHA512 0668f4882a1cf7104d8b2cfd27fe0941e5329a359d11c1f5eae038f5d52e997f026a5b6bb636b66317e14982e319aa66c557df4470e8c81a5ea1b892a34b5fab

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

MD5 525ce438edf0cd4487f3d7ce389aae64
SHA1 ebc64f4e8aef00782412ac799936ea4b19cc145e
SHA256 d2d5fdd90a7321bdb0a850a16c40df517cf35353a8a3d86124b624f361806590
SHA512 4ee1859ce5c505bf05503c7a6769fcefe7e39d6491f23f9b626a93f18c495b41cec1f6d54bee80dba34958ba763e764ef5eeaea56c32b8d2d1dd31af2563bb24

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\d1bb708f-634b-4491-83bb-99205724ffd8.tmp

MD5 aaeee04ed8946734ff11730c5fe0e439
SHA1 9e8bc3be16adbf34841c93f8a4b834444ff80896
SHA256 ba490b436bf9136f0a606811351be2317e6e04ee13511dc8cc0a4c3d9fc9c69a
SHA512 b6d017ab7da80e12476cf97d56b7317cfd2363861d7d8c0633d6045f117671ef449b9eb621838fafa7ac851c793fe0fc32aa6d0eaf366f1fae9c85f8567cb4ec

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 608f70002096d96fa130bcb61698d490
SHA1 8065a6bb00f5ebb6e3a7705526f561c30e6f368f
SHA256 b40b3764b8fb036b2e4ab617be28941d4369dfd0447abd8b492cf49f00cb3652
SHA512 60998e98e6616badbd6f64e78a8efcc2f107c3167363d1cd897f223ef8bd6f30a717800643e4422aa0b400d11e0b98be9bd36bc7572af1302017ef8300bd1e1b

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\508d2d17-2de8-4f9b-a4de-34f80a2054a7.tmp

MD5 f801e004c484872836d4a9bf55805fc0
SHA1 7a13e2bac3b25731a31567109df395e607f01212
SHA256 5156a0e8b047a73b4429b473fd017db094b2fdf6ab38a5d0ca4a5b6aa99cfd23
SHA512 06ddbf14e1cc115f12c96b701907226fbb32e9b789bc837373e712a3914445ac17730dceabdd54e54075b283d97cb6e488a48c9f2254c2a46f662d6233f66e12

memory/2092-1481-0x0000000000400000-0x0000000002BC5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 3637352bbf9bdcc0d754cadc3afee445
SHA1 5926af6fea26a0ca14727e10195d779ddc842934
SHA256 e3daa8cd1b68db591c4c7b3023beabc4f7b7a00be2411e1aea6e3f25dbf3eef6
SHA512 5ed259fc40d577e992a9fe084dcd7fee7975ea8bd692d41a7d278d1a41079d366af6c53130aabc13c1657cdd995699091458605ca8a98fe3c9e8ed6c97929b98

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 b7d9d08cc7c731abf2eaa579d1b2f81c
SHA1 334a84cfa03f096a2cd3c87b48e2c4e79587b5a3
SHA256 4b1fd200c8c159f969674b4beae1cf79f708aca9874a8c9160e1318c2522a035
SHA512 768a2fee958b21623ba33816447b50d0ca820f4624fcb875536c0c0f4462e07a081aac889d0b301b3353f9bee0e1872de9553b025a49984188f98800e43e1246

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000005

MD5 c2b78d7a388c991a5eb6f97e37439209
SHA1 9b22565bce9903721cd4c3208e543275f0d8ccb1
SHA256 6b1be68af806d8ac07f0957f855751d5cf2b99457cbba0da14b8fdb2c1c77b96
SHA512 e4b0b7b1ce9a1a4387d24165bbb47dd8ec05d5a1d812dcda8bdf146a7a394afff162c44caac61d8da4bca7a125d9368c14beccfe37e8357c7a8176eec7aa990a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000006

MD5 dcb103cce793c24bbde5055ae177c3c2
SHA1 2c60c9913fd659459ade4523577db7473a2812f5
SHA256 af2932d7a32f633fe1b1ff9a72a650fc9ea8da63ba6565abad022eeb8b56c134
SHA512 c08a5330e7b6538c1ddf4e1296ec5e10ad88bb54046de771e39a6f265c2d07f25443b32f553a3de0ce6d9c39b634321d5ba41daaf186eae15e542e9243c02516

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000008

MD5 139dcc02730790b90b0c33f848d99c05
SHA1 87da8b439dff631f9d924779fcea254357f11869
SHA256 dcf6d129ee50196cd66a3aa2dff31847e20fb823d32c6551ee163471f5c38fa9
SHA512 a1694a1e3b29e664c136147cf5fc44965050fa2e05b90424bc428b72a40b833fc550d2d27681573e62aaafef66f3f54cd7f08d1b0ccd992eeb1972457e004e83

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

MD5 9be771b85d04b4017a4e05bb962ef34d
SHA1 10dcf54f3bd9c01bc408240a1b1999c6b2b79a75
SHA256 50fcf2a9d1f9ebd0a15ce92178c94073b658d77630adbed74a423511af9e2fcd
SHA512 b5f669aade66a46ff29b9518c27436542d51a63b8ad460ee14bbdb76358b90281fecf9ec1031d1e78c65c250fc2bac47c69a5977c99d2fc1bb86267e3ce2c167

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 3a88ce8bc75220d19bb575d4c11dcf81
SHA1 3dd7e2c9dc173b89221a4d92219c8426ecd86ea3
SHA256 979257fe4d9b737b29d54b5dbf8d25438ba9c2913ecb66b2ed2311cf85b21a82
SHA512 a321ce47db9465bd42b7a0d94990d1ad8434bbda746f437bca01ff741069efa14b9cc5c4747f1306bf9688ecc97e89815cccae50db48752db05428d892e23d66

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000007

MD5 a38340113e3b08efe28c2de1c0b22342
SHA1 d0ce7c5744e7c696d6b786960073332e09d79233
SHA256 ddb6dd7e09ec40da43285a988d62814f3f189f4059c6626cccbbae667e53e79c
SHA512 4f21451b9a64c8ffc30f6228219ea2e3bfe9f3fb01669c292305d0bfed161727e8433cbc356b4e3b717a012a0f845949c97ca29ba55dff89a72048fd121f6235

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 9d0351f9ba4b79406c69bb53826d59f6
SHA1 fb452018024ef9fb759e93cd7144c5d70443cae6
SHA256 2a345757a3e944cf4c6e2823758c7d9dcf13c5cd090500b7ea6e5e478ac2ca78
SHA512 bde80075604680b21fa39ea47a1d3119eda701b3468f81499542dbf17b7de8746341ffc68dea2144056354d528d2515d862d3d8c4ff87fb0fd5a47bf40d9b543

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 7a695c16fce2250e6f7477f0e07561d1
SHA1 faf3203f5097b044bb844c133229c89ee073907b
SHA256 fda872424b88218424047972195817bb62cd78c0c3b15679e72a3f6aabfd1462
SHA512 68aa7f1a7fb80c731987f700ea73fb0940fbfc154930cf70b4efa616d46d0081c1292861c998d603ab976dc27d112fd07c4fb867800f57694bd4e39f760fb26c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000009

MD5 14729cfe302b210307f85fc45e2d9b23
SHA1 7e682120a3f3f375e44e36eaf32dced70f63926b
SHA256 7682bd6b80f6bdf6a2a30edbb2f4a6b85b214b396ac176775d96d0d3ca48bf46
SHA512 46db928d4a34c78c8fd11a20bd82acc989c95e2d0dec4da4696696b84c82b4f2c03a54480f3ba0ddba4b03a460bfca0df3f2c5c761810743d827c720887f612d

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000a

MD5 f441681b4d38077a2171517b9d457fca
SHA1 711931b2bba09548873791ece35e7e091337ed91
SHA256 7bf003aec1a0428fff8a1e984efb075eaaaa67bcea10238ce9d998a9141c7691
SHA512 24ee2bdc6ebeb8eed07499c3a6137f172960a7039fdd5b8ae881d43f756b882918f04c6c4c44081c765d43026f5b149a13cf0e6c68551cbb654fcf06dfbe7e8c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000b

MD5 65004d60372c60b52af3f8a776ea34a8
SHA1 7c3d7a78642eb701e8491446c88a45c542414a53
SHA256 6a426bd8f7ed348f84de21e49322c118ead8df8833dd4022f4294caaa880a6fc
SHA512 9378de64219551d962dc8411a36659d4818c53c5fd9e8c98dcbae74b3b4d21551a294afba9ed1dbbf15b02a4bfa63e03a1d448106f507afc8a044e2196c4b3ca

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000c

MD5 67b5e07b95cd99cba17d94f1972eb07e
SHA1 5ccbfb91cc9afcdad6f680850cf445c8fd27e033
SHA256 7eb585b8c5e129afcf8a526ebd2e89f4ca8921bc45472f606ba9c6e550338393
SHA512 820a5847aa9f6742173596e25ed8d03d5dd88eb520061942d9dd7d733202ac30197d6dbb07136c7d6b2ddca2012254944ee09a4c9da5837667b0db79a0dc599f

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000d

MD5 df779a2c386d784513dc936b8699684d
SHA1 db7e270353192e3080b20d4f2c2a53af0dd4bc79
SHA256 37183f5b2b787beb9ac494f9f5bb5dc904a1833140ae44caa8efdaeb8162345c
SHA512 fb58e30d4a1ba8941da8e9e5515e0034f01641d3fab3fb26da0f342951f10a0464a9690fd8bdeb1aedc7eb196ffc343deba197e3fdf824fe4e7e3b8f6b04baf2

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000e

MD5 794cf24d4f2c199c76bfa9cf38ea54fa
SHA1 42262c365a072cfeb882316659f9aeab6858019d
SHA256 c905408d9a16225970ffdcf91bf7b9ee775d378a603b2c5d67b17e71aedc9b9b
SHA512 33e2ab883611c87ae7625ef234edb92fc197ef8a772225a8420101101d6867fb3eda9f5eca6c80f9bb7698d4a953d7a34a1b9e9a552915e0c432978f6fcdcd5c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000f

MD5 5d8b68138dc91f883b9fcc4a2c9107b1
SHA1 34a20639ed42c81babe0b26378abee7ad1a7db30
SHA256 2ac6f8dc81f161f1c2cf702fa9e83dd0686bcb4b5a4e85b3586726eec953653e
SHA512 73398edbf38ea4b77d0e8a47513d0b9c11fc0994a394842385f50dcad631a20a4de0e5f2869c06d62ea62d2b35126f3dd809b1da62d8da301210719c76a6113f

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 a8aa2a8f502a2f9f9df709147955e8c9
SHA1 80177a2e49f7df00a93352962e1a554b79dcb3a5
SHA256 555c9e77ff670771b8531d13c1e18e80ab1f2837923742b24a57876605d7ad64
SHA512 9eb0f544eb52c8414a1fde1d2637f8b8528eb52113994bd32d184e36b7d34f21ea764707cee7cd8ea5d01f38059ecaa360b56ef58602c432fb4c8ccd699aed1b

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 833124db02e07845db62cd1ef971d597
SHA1 0f505dd0a681483c0ded5be4c758b8f3696e697f
SHA256 ee8c13b57d4e37aad741c5661e8769596960b7e1323a96164d3f0c60fa491962
SHA512 2c7494605a363318b187fd27cb9a75b84f530a0e1f031e2272959e4b8fdda8cf70418093a8ec27624235782211567ed87f072a9bc197b1045566d353567df169

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000010

MD5 14ea95b55b47c887643447132dd986db
SHA1 de2aef1380a6a0624271e364b6e43db40c4f1bf9
SHA256 dc02d2e69e346df37ed560966abf8b6a14b54e4e6005699318446cc6405b558a
SHA512 69d81b104eae3ea162aebefc599723a2ae8c1b408df28ea791f7aa3f56eecd85fb120233d7da1ef6eeeaa0481858feecc73a0daf6f17e55b8bc04c81fcbe2d3c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000011

MD5 fc4db204284d69eb5855913eb4261d48
SHA1 e7c292060f480adde41aceaec59d0726d86c3036
SHA256 4a33c234bbf512caafcd16203991132debecb09e8c8569043cf48b1493746e48
SHA512 198a96fa6bc9141b8d41b7ec99f6bc5c94078e5e7341701e67bc263a8d46d170a401f3ac8cb7c5a3228bd6a77d00d59f2ef8386043c871587675066b0a7d18f5

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\2bef248a-a9a8-43f4-be90-13a1882e0da2.tmp

MD5 dfebf489f2502eb65dc35670eeb212ed
SHA1 ea357dffdb49f5e736c0cb22c493bc480e8af19a
SHA256 5bd64d8f29781c24414253a23ce07ac265f3357ca0c9dcd9b00a3e3724f8328f
SHA512 309653a64b3dfeb041d86e634acbc0871f912f06d5043a4bb49189ce5dae5f22f1fe7b178ed84c9a77362c1b530905b55b62bc5f677511e4ffa1550bd7e4723a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 4228b95fdd749e80beed30e19909f9e8
SHA1 ce117e60ffaec59ee3ba84cc0a66c654ef7181ae
SHA256 5c9b1899be529aaf608ac5a38a5d7197caad873dc33be932cff70d7fa1d59f20
SHA512 8072b9e10cf5dc5cdf9ed61936116f3d64381bdc8d142a3ff2d6e43ad367bfe9fa9d07775f1b9fa9d9e75db8f1514cd152dbdf3b365447a31117bf7cc6865976

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 a39cf0bbd4a202486eb57a82733bce99
SHA1 99ae69d10d99e7ec4ab914cfeac31f0b188fa61e
SHA256 2545609b2b06383a6020a38a623aee28ca301ab9b0f0432617cd7b992a879ac6
SHA512 256305450003c5d72aa577d626d74a56fc4e5a9f8aaaf2bfc7b4e9122d9a7f9a44c22f8630033bfbf05f3d9b45c59bf4e75d502a6d9d537e6c0c492766aea05c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000012

MD5 400ee3db02edcf0377b8b08274e437df
SHA1 868f730ab5dd51a7353ec0e38dc03498543988fe
SHA256 8d48f552547076c027aa26a0a7e9aaec923a84dd4ed2193cccfb4cacef129a19
SHA512 9174b7ff0754f9660237ec7030d992cf6e6b1bd55e8c11e46b70f400112c9ccceea2d28a05f4e8932af47b29ce11d3b8da2f669a71b402c4d08eff2d8046f74f

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 2d5de3e53334e47dcd8ced48563aea19
SHA1 ea6d3cfa58466514660ce36716f6ca832b937609
SHA256 d5e3b11e8641a197f13f25cfa069a4eabee95cbdd94e7d13c43ca9a9a8f4b90d
SHA512 c0d5c97aceeaaddc35d3bf4e4a3acfb3e095e49df9e1967b6f7db7854168caec69386421afa5d0cd95197ae247abf675eac1cb553d00b409966b94d1d117cb77

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000013

MD5 e1a4206de81eb473d22c9fb54de1c5c5
SHA1 e3dc3a5aab980521cca0ab797b58bec53219ce0d
SHA256 891fc4996a78ef55df629730cad4eb32368e1f7c8a7dfbaeca0c41dc87b180f5
SHA512 9f721c28600bdbb03a1cd16b305221860707c999890f2fbde656a596641291c0c90e4beebd6a9e561aa4dacbb458b6c0d5f24ee8f23c6f0c7714f7b187643de9

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000014

MD5 3669e98b2ae9734d101d572190d0c90d
SHA1 5e36898bebc6b11d8e985173fd8b401dc1820852
SHA256 7061caa61b21e5e5c1419ae0dc8299142ba89c8169a2bd968b6de34a564f888a
SHA512 0c5f0190b0df4939c2555ec7053a24f5dae388a0936140d68ed720a70542b40aaf65c882f43eb1878704bea3bd18934de4b1aac57a92f89bbb4c67a51b983ae3

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000015

MD5 c1164ab65ff7e42adb16975e59216b06
SHA1 ac7204effb50d0b350b1e362778460515f113ecc
SHA256 d7928d8f5536d503eb37c541b5ce813941694b71b0eb550250c7e4cbcb1babbb
SHA512 1f84a9d9d51ac92e8fb66b54d103986e5c8a1ca03f52a7d8cdf21b77eb9f466568b33821530e80366ce95900b20816e14a767b73043a0019de4a2f1a4ffd1509

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 ec0cabca57847e5c44d5193e0a470b05
SHA1 ff4b539935fc8057e8f264ffae4c5ac8ba135832
SHA256 7f5fd2cf1e38787cd2ee986ba877bb50536413dee13b015ab58fc1c631206d1e
SHA512 2f84aa6217eef130895d10feb5beb26bc0bfcb4ba5821f2523110e16cd3988be3a71576a45f65ec9e6511ded2a0a2e4f376ae1ab7f3e2aa09e4eae71ce411e89

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000016

MD5 b63bcace3731e74f6c45002db72b2683
SHA1 99898168473775a18170adad4d313082da090976
SHA256 ea3a8425dcf06dbc9c9be0ccd2eb6381507dd5ac45e2a685b3a9b1b5d289d085
SHA512 d62d4dddb7ec61ef82d84f93f6303001ba78d16fd727090c9d8326a86ab270f926b338c8164c2721569485663da88b850c3a6452ccb8b3650c6fa5ce1ce0f140

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000017

MD5 9978db669e49523b7adb3af80d561b1b
SHA1 7eb15d01e2afd057188741fad9ea1719bccc01ea
SHA256 4e57f4cf302186300f95c74144cbca9eb756c0a8313ebf32f8aba5c279dd059c
SHA512 04b216bd907c70ee2b96e513f7de56481388b577e6ccd67145a48178a605581fab715096cfb75d1bb336e6ad0060701d2a3680e9f38fe31e1573d5965f1e380a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 aa736677fcf91d5577a2e8af7205114d
SHA1 d4a8d6d4f25cd394b6c4e51d800321f601703df6
SHA256 974d0d3c223e06fed54bb2d2812c3167b9404563c5580492bd0ae3b691c406c5
SHA512 0dadfdd01cbc28922bd2a922e5fce0d2bd0392e43be4ac52f56d6f5b71c9262701919003eb7a8ceeebdc66da8a29b95114bfe62fa9cca718cdf3c69ffb193086

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 2f2fff59715e39a33399d4c6d002c9d7
SHA1 119c23a4206abbacfe40183552ec268129a7ba1a
SHA256 45e5261242291b7b080198d9b7447c44198a8fc49f508e02563c86ef8728a75f
SHA512 415204421df0782f61ab243e5cbf930d71ea598e07d923ad7f251be564f2e2a663132d75f68a99f83da8faa512a0d274adb8e20df06458acad3c60c88d42580a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 90b640defdb0de576a2ebf2560864d99
SHA1 7b673eb18d6474b47d83e9f26ac1db7a403bc11e
SHA256 d625ac68983b65462ecaa2df60f8863848f050045ce4bdab183fef08fedeb075
SHA512 d2f4e4a73425ceb8a7c65f0847d69af520b193e82877a7c0fba5683eb5db09dd47104cae472fa826a90a8e6f04ec64967236f46f6dd7a2a96ad247a077b45fe7

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\js\index-dir\the-real-index

MD5 2549efafad87199dcc62c965aae50967
SHA1 11ac222477762c3c8f61d1a8c60dda1e5511f0ce
SHA256 581955727ce93ece2736ea779ba1ac2cc97104c1bd9c77780e9fd9fc41e9526c
SHA512 159caecd44b0d277339884a62c5085b68b2aa92853643e7336a20fe4db2dcdfb8177c319e5c66c747f80a683421e5c49260049872f041119033ab200eec22719

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\js\index-dir\the-real-index~RFe59a57d.TMP

MD5 09bb355deacc2cce776d2922f8747e73
SHA1 8d13c6020cc79348a3ce1cef2e6406679219f9e8
SHA256 5fe97163dd373be7d21188da8ca1dc0fe6b41427709ff612a7945244809528a0
SHA512 f8749eb315235e91c4894290d082fb748e2c048404879e699c463c5d2c2c661596a4f105c073629dc7491dacea9736e6e21c09fc1d6dbc558917028fc537a7e7

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 868e663d9b4176e2db69c3936d712f92
SHA1 8f66143ecee81039e16920e07fe042fb80284250
SHA256 252c1aa604899951df5c907cf41b0d3a7c26f0d1870b4532a858cad0548db3d8
SHA512 a7ff761f04c579a49cc42d621a29a06a5db1176667a84f1475c3f29018559c8a114764e55aa09d4d718a7aba3702a76de71b6dc26a7d10de9f44a00216067019

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-08 15:16

Reported

2024-11-08 15:18

Platform

win7-20240903-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

Fabookie family

fabookie

GCleaner

loader gcleaner

Gcleaner family

gcleaner

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

OnlyLogger

loader onlylogger

Onlylogger family

onlylogger

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

OnlyLogger payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1682dd72002d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1682dd72002d.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu167e7760aad196df0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu167e7760aad196df0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1603650aaf956dc3.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1603650aaf956dc3.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f1bb7b9d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f1bb7b9d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu162f05ff69c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu162f05ff69c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f1bb7b9d.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu162f05ff69c.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16bd6a3899e6631eb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16bd6a3899e6631eb.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-NKGDK.tmp\Thu16f1bb7b9d.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-NKGDK.tmp\Thu16f1bb7b9d.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-NKGDK.tmp\Thu16f1bb7b9d.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp N/A

Reads user/profile data of web browsers

spyware stealer

Accesses 2FA software files, possible credential harvesting

spyware stealer

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A
N/A ip-api.com N/A N/A

Looks up geolocation information via web service

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\SmartPDF\unins000.dat C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp N/A
File created C:\Program Files (x86)\SmartPDF\is-H0I82.tmp C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp N/A
File opened for modification C:\Program Files (x86)\SmartPDF\unins000.dat C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp N/A

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu162f05ff69c.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-NKGDK.tmp\Thu16f1bb7b9d.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f1bb7b9d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1682dd72002d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu167e7760aad196df0.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16bd6a3899e6631eb.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1603650aaf956dc3.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\setup_installer.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16bd6a3899e6631eb.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16bd6a3899e6631eb.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16bd6a3899e6631eb.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16bd6a3899e6631eb.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16bd6a3899e6631eb.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16955bd58fe3.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1685a3be08acb.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu165d02e803.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2336 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe
PID 2336 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe
PID 2336 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe
PID 2336 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe
PID 2336 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe
PID 2336 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe
PID 2336 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\setup_installer.exe C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe
PID 2876 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2624 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2652 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1956 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2876 wrote to memory of 1952 N/A C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\setup_installer.exe

"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"

C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu1685a3be08acb.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu162f05ff69c.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu1682dd72002d.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu167e7760aad196df0.exe /mixone

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu165d02e803.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu1624e2ea3e09f6.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu16f15c2b41d26eb.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu16f1bb7b9d.exe

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1685a3be08acb.exe

Thu1685a3be08acb.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu16bd6a3899e6631eb.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu1603650aaf956dc3.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Thu16955bd58fe3.exe

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1682dd72002d.exe

Thu1682dd72002d.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1603650aaf956dc3.exe

Thu1603650aaf956dc3.exe

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu167e7760aad196df0.exe

Thu167e7760aad196df0.exe /mixone

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16955bd58fe3.exe

Thu16955bd58fe3.exe

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu165d02e803.exe

Thu165d02e803.exe

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe

Thu16f15c2b41d26eb.exe

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu162f05ff69c.exe

Thu162f05ff69c.exe

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f1bb7b9d.exe

Thu16f1bb7b9d.exe

C:\Users\Admin\AppData\Local\Temp\is-NKGDK.tmp\Thu16f1bb7b9d.tmp

"C:\Users\Admin\AppData\Local\Temp\is-NKGDK.tmp\Thu16f1bb7b9d.tmp" /SL5="$601CE,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f1bb7b9d.exe"

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16bd6a3899e6631eb.exe

Thu16bd6a3899e6631eb.exe

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1624e2ea3e09f6.exe

Thu1624e2ea3e09f6.exe

C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp

"C:\Users\Admin\AppData\Local\Temp\is-5USH7.tmp\Thu162f05ff69c.tmp" /SL5="$80190,138429,56832,C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu162f05ff69c.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 448

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{tZYs-H3bGH-6sw7-EpyC7}\48536057384.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{tZYs-H3bGH-6sw7-EpyC7}\51494347027.exe" /mix

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{tZYs-H3bGH-6sw7-EpyC7}\34174556479.exe" /mix

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "Thu167e7760aad196df0.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu167e7760aad196df0.exe" & exit

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "Thu167e7760aad196df0.exe" /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 hsiens.xyz udp
US 8.8.8.8:53 a.goatgame.co udp
N/A 127.0.0.1:49270 tcp
N/A 127.0.0.1:49272 tcp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.59.81:80 ipinfo.io tcp
US 34.117.59.81:443 ipinfo.io tcp
US 34.117.59.81:443 ipinfo.io tcp
US 8.8.8.8:53 proxycheck.io udp
US 172.67.75.219:80 proxycheck.io tcp
US 8.8.8.8:53 c115ccef-fcb1-4039-a9a5-8e09a6993f8d.s3.eu-west-2.amazonaws.com udp
GB 52.95.143.114:80 c115ccef-fcb1-4039-a9a5-8e09a6993f8d.s3.eu-west-2.amazonaws.com tcp
GB 52.95.143.114:80 c115ccef-fcb1-4039-a9a5-8e09a6993f8d.s3.eu-west-2.amazonaws.com tcp
US 8.8.8.8:53 www.listincode.com udp
US 54.209.42.5:443 www.listincode.com tcp
US 8.8.8.8:53 safialinks.com udp
US 8.8.8.8:53 gheorghip.tumblr.com udp
US 74.114.154.22:443 gheorghip.tumblr.com tcp
US 8.8.8.8:53 activityhike.com udp
US 3.225.234.52:443 www.listincode.com tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.135.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 remotenetwork.xyz udp
US 8.8.8.8:53 startupmart.bar udp
US 8.8.8.8:53 cleaner-partners.biz udp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 best-supply-link.xyz udp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 best-link-app.com udp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 www.iyiqian.com udp
SG 13.251.16.150:80 www.iyiqian.com tcp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp
UA 194.145.227.161:80 194.145.227.161 tcp
DE 162.55.179.90:80 tcp
US 104.26.3.46:80 iplogger.org tcp
US 104.26.3.46:443 iplogger.org tcp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 2no.co udp
US 104.21.79.229:443 2no.co tcp
US 104.21.79.229:443 2no.co tcp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.19.117.22:80 crl.microsoft.com tcp
DE 162.55.179.90:80 tcp
DE 162.55.179.90:80 tcp

Files

C:\Users\Admin\AppData\Local\Temp\7zS02991886\setup_install.exe

MD5 08eebacc710285f112d456fb556dbc10
SHA1 a816b9c43ba56708955f2cae45134dd3bf6e424d
SHA256 45157c321a80609c4585cfc044979d524db6c00ad15664d626f6a1956d1d5f32
SHA512 6ef21f52613f8dfd752abc2aab21fa937954c31346448f24a3f924120c4aca471f9d1c7464f583ebed00def1a181683358f9cea6af472768faf7526a82f83b49

C:\Users\Admin\AppData\Local\Temp\7zS02991886\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

memory/2876-50-0x000000006B280000-0x000000006B2A6000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zS02991886\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

\Users\Admin\AppData\Local\Temp\7zS02991886\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

C:\Users\Admin\AppData\Local\Temp\7zS02991886\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

memory/2876-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zS02991886\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

memory/2876-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2876-63-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2876-62-0x0000000064941000-0x000000006494F000-memory.dmp

memory/2876-68-0x0000000064940000-0x0000000064959000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1685a3be08acb.exe

MD5 bb3d37652e1977e1b48593f9b6e3f28e
SHA1 c6e34e278834692c6f04ec89cb7d9a5cd07a88b3
SHA256 1ebf7ca7b712fbf64686d8be3aea17cf96d6382795e59bcc21085430fe0d8071
SHA512 7c06c7d058cc2dff00f2457cee775471c9477c68ea1e841c852367bee767aa0cc5a1598709101eeb2c9d1e0710943db5b9d30ebd8187bed414cfc7953cd95569

memory/2876-73-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu162f05ff69c.exe

MD5 45d1381f848b167ba1bca659f0f36556
SHA1 bb282731c8f1794a5134a97c91312b98edde72d6
SHA256 8a1b542e56cf75216fcd1d1dd4bf379b8b4e7a473785013d5fbf6ce02dbdcf28
SHA512 a7171f37ae4612cda2c66fece92deea537942697b4580f938cdd9d07d445d89bac193e934569141fe064355b2a5e675aaa5c348298d96ff1e13dbe01732eeb0f

memory/2876-72-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2876-71-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2876-70-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2876-69-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2876-67-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2876-66-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2876-65-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2876-64-0x000000006B440000-0x000000006B4CF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1682dd72002d.exe

MD5 416392dae28120d0cb8868aed33e5765
SHA1 bb4661be43536658ca109757cebe18ca13f17b98
SHA256 d902fa8f486a828b78882393eda791dd9798327cc9fb2db790a8b566a1e45ace
SHA512 4701eefcaf54fd2abcf121374885498678d83bb527d914fdbdb71582b15f2828a6135c266324e308a4f3984ccc95d6c1ee2b18845489825e63f011348eb0c4c9

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu165d02e803.exe

MD5 b9d6fa9af107c8f185fa981e9365a3ec
SHA1 77b4459537959d478a4dc9ba64c80d44a278f679
SHA256 37b758e9d8ac0212bde2acff6c6a1d53f0bfcc202f2d129a7ee4e0a4dcac3770
SHA512 a9c631b58686dd0b86c95046709d667fae31dddd7a74b62235840d67d2aa4b2ce1cdc235f87d151c880137ee7d69cb934dc6239aada7de9b532b331b9e54b090

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1624e2ea3e09f6.exe

MD5 5af7bc821a1501b38c4b153fa0f5dade
SHA1 467635cce64ae4e3ce41d1819d2ec6abdf5414f3
SHA256 773f2e6660cc3a2b3bb55c0b88a74d24db0dfc5c0cef7c5b13ec9aac48f5d6b6
SHA512 53fd58565d6ca16fc9ca7113cd90657ef8c09fa2efcc9603f6da5c2a3050aaeb1d8edfc46b2b40d80b44a8ccce27d9e4fc6bac62bac236fdc360ebdab3b5c146

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu167e7760aad196df0.exe

MD5 3a9115aa34ddc3302fe3d07ceddd4373
SHA1 10e7f2a8c421c825a2467d488b33de09c2c2a14b
SHA256 080060800d33d4fa01099647797195995af436cbad0a5dc903a572b184b50634
SHA512 85fa6eddbaec2df843d623ddf88154cd2b62b9823c953b5659dc0464e1a47b90a877ca3681007561d2e1ccdd315e4f79ecf0285404868cc7cedd369ae28a586a

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f15c2b41d26eb.exe

MD5 bac81e523c07dbf26d83e730af2940f8
SHA1 a34e9eb9578c3a26f24d6a5a534d1ddc39d55897
SHA256 8b67520efec54d44d25e03611fc76c66560d5daf7504d72e5cd2a96a580c0bc1
SHA512 3679790714d9536323fb3d7073a60ab7239983e31c67fabd4a874623016f9bb36bd94160b20c9e696969a49f3b877e7b5a03cfc29c78753fbd5d1eb6f7f434be

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16f1bb7b9d.exe

MD5 b160ce13f27f1e016b7bfc7a015f686b
SHA1 bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256 fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA512 9578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu1603650aaf956dc3.exe

MD5 a1c7ed2563212e0aba70af8a654962fd
SHA1 987e944110921327adaba51d557dbf20dee886d5
SHA256 a15773680b31415eeebf20246f283857bda7e7dda16f4674c2cbeba2106e3592
SHA512 60d827b6d36d6f3a1b4af445b25f26812043d2be8934c338d29b8a1bbe0b50d8a7c06f54ea14afa1d9dbbc6340c649dc51b0ae12d77329e1fb6fdf99e896a462

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16955bd58fe3.exe

MD5 f75305acc33c08e43f7bba73b0adfb0b
SHA1 93edf0bf57d39a79e89fed208ca0a0e65356f542
SHA256 3e737690e143e28ad6acc866fe2eff94f9084ace48b40687eff354256ceb2c66
SHA512 3d8eb705bc7745c91e42dd8a06066c182ced8d0ee514ed949ff3e083b33fe084e7b2fced7c355805f81f4aae93540a26b25b956ccf2d5cf4a12184ea25954392

C:\Users\Admin\AppData\Local\Temp\7zS02991886\Thu16bd6a3899e6631eb.exe

MD5 d80cd22e3948dbbf2b11e84cc6179d82
SHA1 641691190bca3998148c8b19f17357baeb7d9bcd
SHA256 299b3ce525750db5dc8d7638966025cf0d0169e386dc0e5514d8dca3509c137f
SHA512 f4f0513d483c72450e67d29fed4a69664357984f8908e4ac95b969ab21d655946c13607daccadb89fcf663b856e2fccabfc8552fd9951c9a1c0441a21f8d8ef3

memory/2904-106-0x0000000000150000-0x0000000000158000-memory.dmp

memory/1752-109-0x0000000001090000-0x00000000010BC000-memory.dmp

memory/1752-133-0x0000000000330000-0x0000000000336000-memory.dmp

\Users\Admin\AppData\Local\Temp\is-NKGDK.tmp\Thu16f1bb7b9d.tmp

MD5 6020849fbca45bc0c69d4d4a0f4b62e7
SHA1 5be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256 c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512 f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb

memory/1752-134-0x0000000000340000-0x0000000000362000-memory.dmp

memory/1752-135-0x0000000000360000-0x0000000000366000-memory.dmp

memory/3012-127-0x00000000000D0000-0x0000000000258000-memory.dmp

memory/1800-124-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2248-118-0x0000000000400000-0x000000000046D000-memory.dmp

memory/1716-139-0x0000000000400000-0x0000000002B5B000-memory.dmp

memory/2396-154-0x0000000002440000-0x000000000247C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-M42LH.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

memory/3012-156-0x00000000005E0000-0x00000000005F0000-memory.dmp

memory/3012-157-0x000000001B3F0000-0x000000001B474000-memory.dmp

memory/2876-165-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2876-164-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2876-162-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/2876-159-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2876-158-0x0000000000400000-0x000000000051C000-memory.dmp

memory/2876-166-0x000000006FE40000-0x000000006FFC6000-memory.dmp

C:\Users\Admin\AppData\Local\Module_Art\Thu165d02e803.exe_Url_wrsekej1xhux2uq1lrzijvzkvhj2nyvj\1.2.1.0\user.config

MD5 1b02b89ab3872d00c6a46cb4a7048dc9
SHA1 0840aefbbe40a00d7290d32ce8243de3cf98339e
SHA256 ac8517efbed88850a40943fbd667d9a06f6a156f0031109f59b4ca821aa22fd4
SHA512 0eeee6c2cf1eaa11d561ba17ed65caf97e069b5ccbf7420c3ae4bf88859f1273034a600da91620411b12cd3241dcfabdc8d4ddd58218f2781254ac6ccf1fa419

C:\Users\Admin\AppData\Local\Module_Art\Thu165d02e803.exe_Url_wrsekej1xhux2uq1lrzijvzkvhj2nyvj\1.2.1.0\2gkjsql2.newcfg

MD5 d71a12b7aa02592b03878877eb133425
SHA1 899c5404464c3efed66534207d0245e0cf050488
SHA256 b44c3fa39198be28e0e723fd458eae31a5f05041926917fe11e2b265aa0cbee4
SHA512 ae0733fe01b479f4ad291ac1180ae9f9b5833fa072001c40728d9f26d4aa9e94ec0239432df16cad35c2675b41d58c6e599fbd0dbc1354d297ab8bca30cd4441

C:\Users\Admin\AppData\Local\Module_Art\Thu165d02e803.exe_Url_wrsekej1xhux2uq1lrzijvzkvhj2nyvj\1.2.1.0\user.config

MD5 8e18625cd36f0075da4bf0ce8fac8204
SHA1 0df80ad1c5ea9bddcb5cfcf2c60c6fb3db903216
SHA256 35799f5570b76aa51478e74ea9d1c42b39be157c3953a2b44047dd3ed2e629b1
SHA512 74d8be6cddfc1c13acb30c18752d93ef8d57348b8b29220914ecb126ae8459318dd150b2f51299870119bdb6483f35417baa988c688f0f621512c5a47e227c26

C:\Users\Admin\AppData\Local\Temp\CabB59B.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarB5CD.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

memory/2248-263-0x0000000000400000-0x000000000046D000-memory.dmp

memory/1416-262-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2912-264-0x0000000000400000-0x0000000002B6B000-memory.dmp

memory/1800-268-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2396-271-0x0000000002440000-0x000000000247C000-memory.dmp

memory/2396-270-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/2424-269-0x0000000000400000-0x0000000002BC5000-memory.dmp

C:\ProgramData\Garbage Cleaner\Garbage Cleaner.exe

MD5 6445250d234e789c0c2afe69f119e326
SHA1 03074f75c0ff50783d8c2e32d96e39b746540f66
SHA256 2e6cd9433e66a9ebde268bc6949d4660de441790bd39ffc9cb0f4caaeb44320f
SHA512 ecd094a4d026378f85435f8a2dc16c92c033aff92ba126d8bbb22d6b279b842d417f4df0f63199ea248d0ec64b9679acb5a1f835560d8e3c5b84be492cc0e68e

memory/2912-293-0x0000000000400000-0x0000000002B6B000-memory.dmp

memory/2396-316-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/2396-341-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/2424-340-0x0000000000400000-0x0000000002BC5000-memory.dmp

memory/2396-346-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/1800-347-0x0000000000400000-0x0000000000414000-memory.dmp