Malware Analysis Report

2024-11-13 19:30

Sample ID 241110-arvybavhkk
Target 00646821a7a4410e7e4dc44c57de03e59df39f82dd2cc435b00f3c35b7b80b9c
SHA256 00646821a7a4410e7e4dc44c57de03e59df39f82dd2cc435b00f3c35b7b80b9c
Tags
gcleaner nullmixer onlylogger socelars vidar aspackv2 discovery dropper execution loader spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

00646821a7a4410e7e4dc44c57de03e59df39f82dd2cc435b00f3c35b7b80b9c

Threat Level: Known bad

The file 00646821a7a4410e7e4dc44c57de03e59df39f82dd2cc435b00f3c35b7b80b9c was found to be: Known bad.

Malicious Activity Summary

gcleaner nullmixer onlylogger socelars vidar aspackv2 discovery dropper execution loader spyware stealer

Nullmixer family

Gcleaner family

Socelars payload

GCleaner

Socelars family

NullMixer

Vidar

OnlyLogger

Socelars

Onlylogger family

Vidar family

OnlyLogger payload

Vidar Stealer

Command and Scripting Interpreter: PowerShell

Loads dropped DLL

ASPack v2.12-2.42

Executes dropped EXE

Reads user/profile data of web browsers

Checks computer location settings

Looks up geolocation information via web service

Checks installed software on the system

Legitimate hosting services abused for malware hosting/C2

Drops Chrome extension

Unsigned PE

Program crash

Browser Information Discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Enumerates system info in registry

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Modifies system certificate store

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Checks SCSI registry key(s)

Kills process with taskkill

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-10 00:27

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-10 00:27

Reported

2024-11-10 00:29

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe"

Signatures

GCleaner

loader gcleaner

Gcleaner family

gcleaner

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

OnlyLogger

loader onlylogger

Onlylogger family

onlylogger

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

OnlyLogger payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up geolocation information via web service

Browser Information Discovery

discovery

Enumerates physical storage devices

Program crash

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15818fcb352.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
N/A N/A C:\Windows\SysWOW64\WerFault.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1543669f69f247e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-PVENJ.tmp\Mon151a01e1ddefea03.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon151a01e1ddefea03.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15f819eb2300d8eae.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\xcopy.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15818fcb352.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15818fcb352.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15818fcb352.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15818fcb352.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier C:\Windows\SysWOW64\xcopy.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15f819eb2300d8eae.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15a53317618120.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon159345e4f6bd10e49.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3392 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe
PID 3392 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe
PID 3392 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe
PID 1908 wrote to memory of 4656 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 4656 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 4656 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 2080 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 2080 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 2080 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 3992 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 3992 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 3992 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 4852 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 1932 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 1932 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 1932 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 1460 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 1460 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 1460 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 1428 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 1428 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1908 wrote to memory of 1428 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 3992 wrote to memory of 828 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon151a01e1ddefea03.exe
PID 3992 wrote to memory of 828 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon151a01e1ddefea03.exe
PID 3992 wrote to memory of 828 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon151a01e1ddefea03.exe
PID 4656 wrote to memory of 4816 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4656 wrote to memory of 4816 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4656 wrote to memory of 4816 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4852 wrote to memory of 5088 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15f819eb2300d8eae.exe
PID 4852 wrote to memory of 5088 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15f819eb2300d8eae.exe
PID 4852 wrote to memory of 5088 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15f819eb2300d8eae.exe
PID 3020 wrote to memory of 424 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1543669f69f247e.exe
PID 3020 wrote to memory of 424 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1543669f69f247e.exe
PID 3020 wrote to memory of 424 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1543669f69f247e.exe
PID 684 wrote to memory of 3620 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15a53317618120.exe
PID 684 wrote to memory of 3620 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15a53317618120.exe
PID 2080 wrote to memory of 1584 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15818fcb352.exe
PID 2080 wrote to memory of 1584 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15818fcb352.exe
PID 2080 wrote to memory of 1584 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15818fcb352.exe
PID 1932 wrote to memory of 4020 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
PID 1932 wrote to memory of 4020 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
PID 1932 wrote to memory of 4020 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe
PID 1428 wrote to memory of 1308 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe
PID 1428 wrote to memory of 1308 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe
PID 1428 wrote to memory of 1308 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe
PID 828 wrote to memory of 4084 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon151a01e1ddefea03.exe C:\Users\Admin\AppData\Local\Temp\is-PVENJ.tmp\Mon151a01e1ddefea03.tmp
PID 828 wrote to memory of 4084 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon151a01e1ddefea03.exe C:\Users\Admin\AppData\Local\Temp\is-PVENJ.tmp\Mon151a01e1ddefea03.tmp
PID 828 wrote to memory of 4084 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon151a01e1ddefea03.exe C:\Users\Admin\AppData\Local\Temp\is-PVENJ.tmp\Mon151a01e1ddefea03.tmp
PID 1460 wrote to memory of 4200 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon159345e4f6bd10e49.exe
PID 1460 wrote to memory of 4200 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon159345e4f6bd10e49.exe
PID 1308 wrote to memory of 4700 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe C:\Windows\SysWOW64\cmd.exe
PID 1308 wrote to memory of 4700 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe C:\Windows\SysWOW64\cmd.exe
PID 1308 wrote to memory of 4700 N/A C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe C:\Windows\SysWOW64\cmd.exe
PID 4700 wrote to memory of 4428 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 4700 wrote to memory of 4428 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe
PID 4700 wrote to memory of 4428 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\taskkill.exe

Processes

C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe

"C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe"

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon15818fcb352.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon151a01e1ddefea03.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon15f819eb2300d8eae.exe /mixone

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon1543669f69f247e.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon1547d11c23777f6e7.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon15a53317618120.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon159345e4f6bd10e49.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon1590e659d520c442.exe

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon151a01e1ddefea03.exe

Mon151a01e1ddefea03.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15f819eb2300d8eae.exe

Mon15f819eb2300d8eae.exe /mixone

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1543669f69f247e.exe

Mon1543669f69f247e.exe

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15a53317618120.exe

Mon15a53317618120.exe

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15818fcb352.exe

Mon15818fcb352.exe

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe

Mon1547d11c23777f6e7.exe

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe

Mon1590e659d520c442.exe

C:\Users\Admin\AppData\Local\Temp\is-PVENJ.tmp\Mon151a01e1ddefea03.tmp

"C:\Users\Admin\AppData\Local\Temp\is-PVENJ.tmp\Mon151a01e1ddefea03.tmp" /SL5="$50226,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon151a01e1ddefea03.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1584 -ip 1584

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon159345e4f6bd10e49.exe

Mon159345e4f6bd10e49.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 356

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 824

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 832

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 832

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 848

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1040

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1084

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1504

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1532

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1780

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1588

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1784

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1780

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1616

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1820

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1820

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4020 -ip 4020

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 1028

C:\Windows\SysWOW64\xcopy.exe

xcopy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data" "C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\" /s /e /y

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-50000,-50000 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" https://www.facebook.com/ https://www.facebook.com/pages/ https://secure.facebook.com/ads/manager/account_settings/account_billing/

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa058ccc40,0x7ffa058ccc4c,0x7ffa058ccc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,15062454644571817840,824436221632244285,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1912 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --field-trial-handle=2188,i,15062454644571817840,824436221632244285,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --field-trial-handle=2232,i,15062454644571817840,824436221632244285,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2388 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,15062454644571817840,824436221632244285,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,15062454644571817840,824436221632244285,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3572,i,15062454644571817840,824436221632244285,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3592 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3560,i,15062454644571817840,824436221632244285,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3712 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4800,i,15062454644571817840,824436221632244285,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99" --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5292,i,15062454644571817840,824436221632244285,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5296 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 sornx.xyz udp
FR 217.70.184.38:80 sornx.xyz tcp
US 8.8.8.8:53 38.184.70.217.in-addr.arpa udp
US 8.8.8.8:53 safialinks.com udp
US 8.8.8.8:53 www.listincode.com udp
US 54.205.158.59:443 www.listincode.com tcp
US 8.8.8.8:53 best-link-app.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 gavenetwork.bar udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 remotenetwork.xyz udp
US 8.8.8.8:53 startupmart.bar udp
US 8.8.8.8:53 yip.su udp
US 172.67.169.89:443 yip.su tcp
US 172.67.169.89:443 yip.su tcp
US 8.8.8.8:53 233.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 89.169.67.172.in-addr.arpa udp
US 8.8.8.8:53 67.31.126.40.in-addr.arpa udp
US 52.203.72.196:443 www.listincode.com tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 romkaxarit.tumblr.com udp
US 74.114.154.18:443 romkaxarit.tumblr.com tcp
N/A 127.0.0.1:50187 tcp
N/A 127.0.0.1:50191 tcp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 18.154.114.74.in-addr.arpa udp
US 8.8.8.8:53 cleaner-partners.biz udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
US 8.8.8.8:53 23.149.64.172.in-addr.arpa udp
US 8.8.8.8:53 46.3.26.104.in-addr.arpa udp
US 8.8.8.8:53 227.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 233.38.18.104.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 cleaner-partners.biz udp
UA 194.145.227.161:80 tcp
US 8.8.8.8:53 www.iyiqian.com udp
SG 13.251.16.150:80 www.iyiqian.com tcp
US 8.8.8.8:53 www.facebook.com udp
US 8.8.8.8:53 secure.facebook.com udp
GB 163.70.151.14:443 secure.facebook.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
GB 163.70.151.35:443 www.facebook.com tcp
GB 163.70.151.35:443 www.facebook.com udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 150.16.251.13.in-addr.arpa udp
US 8.8.8.8:53 14.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 10.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 35.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 static.xx.fbcdn.net udp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net tcp
GB 163.70.151.21:443 static.xx.fbcdn.net udp
GB 163.70.151.21:443 static.xx.fbcdn.net udp
US 8.8.8.8:53 21.151.70.163.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 content-autofill.googleapis.com udp
GB 142.250.187.234:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 234.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 facebook.com udp
GB 142.250.187.234:443 content-autofill.googleapis.com udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
UA 194.145.227.161:80 tcp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
UA 194.145.227.161:80 tcp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
UA 194.145.227.161:80 tcp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 a.goatgame.co udp
UA 194.145.227.161:80 tcp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
UA 194.145.227.161:80 tcp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp
UA 194.145.227.161:80 tcp
US 8.8.8.8:53 a.goatgame.co udp
US 8.8.8.8:53 a.goatgame.co udp

Files

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\setup_install.exe

MD5 ea63fe7336450250809db0d2056f724f
SHA1 f8d95c734dfe41ac2584d0efdb68c93c759c22d6
SHA256 054cd22c12aff13859ec9ae1a10375bcc3914673513c03dbb3592d413b4dba0c
SHA512 fd9ffde6eb860a1f89717ca9a7f1bc341f938b32ebaa8d71ca434315df312993f5a506039308a19c572861a92763a12bfedcbbfe1fddaf35bdc202bbe344bb98

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

memory/1908-53-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1908-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1908-52-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1908-51-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1908-50-0x0000000064940000-0x0000000064959000-memory.dmp

memory/1908-49-0x0000000064941000-0x000000006494F000-memory.dmp

memory/1908-48-0x0000000000F40000-0x0000000000FCF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1590e659d520c442.exe

MD5 017877811696abe6571c60b8d8a13691
SHA1 3260dabc5f83fd6f2c8344924e61584fcf3a211b
SHA256 f231e40dc1d9ec5f3cad83a902c65ce5f55b3d50f308eadf1bc023bb7b09eda5
SHA512 9336cd5607d291a851a3e43ffbc8e0bd8243f4414321bedd982710435515358728fc6e9b325dcea214ae39b2c915f2b3345a9a49ccaba6b29274afd440806d52

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1543669f69f247e.exe

MD5 82e04f3fafc14a555130455dd9e48ce1
SHA1 18652d6f22efb1a04c3c22b2183f6d29d3000433
SHA256 ec0e69c6630b329e58ba6bfc82267a42d7f3671f1063e2664a0f386fd0b48f77
SHA512 67dca44f9e2f708a3e1faf04e705f7bda9508c2c8c9e766d748ba324f5c2636bd19fd089cc4b3741ddeace64c14876557dc86719932f47323a26abc914e3bde1

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon1547d11c23777f6e7.exe

MD5 06638b06846ccd816188d8d3b7ea2b63
SHA1 61b5b1bc83f4c6ebe4c101f3a155bb5f530f6d66
SHA256 4976845fd8e234461ee3c35a8fde9426182e1b1e11c9c153efaa908b98eda26e
SHA512 f6965a230b20a377c9cfb72ecdc0e91237fc5cfca0625baed4db8cc650340d4e8bd92a1f4db3949618b53d9ba4f388be25d3bf16a8231809ade467676bb734e0

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15818fcb352.exe

MD5 4e027fbe31b8661f978f274bad3eb8ba
SHA1 d34f80232d77d60fc9e6a35e2c9ea818b9c16dd7
SHA256 c3252e6654504039a01dfceec291330b2672a1ed713438e3cd33d4e1b23a797d
SHA512 7b47a9cde2922cb127131d54c07b64ca631adcdaf34d8077f14b728bb33afcb9194d5b1f872626de5f6133c381ad4d6f552f892d5c46d292cac4ee56c4c49c2a

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15a53317618120.exe

MD5 435447f64b76a53986ce5ba582f97c2b
SHA1 3eb4ddf1efb1071215958127ed76f8a5116b6cb7
SHA256 df41f4165d1a24655d563e14100d68850aeb21d17b908d7dae4629c2317a37f1
SHA512 07b66bd1804ab4bba1e87d1e9cc8d03abd069313d2f92981e8d2d0ea5343283ed0df932b1f6b9d92c16b34cb638b3790ee0000b3b05bcba95a2eab6b63b75de5

memory/828-72-0x0000000000400000-0x000000000046D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon15f819eb2300d8eae.exe

MD5 92351261835372c9982d488b2eca89cd
SHA1 1f521a6a1060d0e1d944af6ce2f06bbda830fca6
SHA256 57c0708b04d7ca429c3ec96a3303b9c372286c3afb619b542a1cb34f13d6fb11
SHA512 fd9b82516033dcdaff2f56268bd54d9abe1b4896624ec319e9cf545a1437b3e85a2ea10663a248fa86e736629a9a0d660e071e3e7f8695041871217594fdbfcd

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon151a01e1ddefea03.exe

MD5 b160ce13f27f1e016b7bfc7a015f686b
SHA1 bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256 fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA512 9578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\Mon159345e4f6bd10e49.exe

MD5 c81293b02eed12d70ef3d44a1967d083
SHA1 29757d92b5a4322e4df24c37cd7e2d040c8fa81b
SHA256 7b4dc1c37be2e23bcdc8219dc032cdfc662d4c696d9bc39589c8acb9cdba6538
SHA512 7d34f29805ecab94d15c84393a7927b943ae9402b9a5c6eb91f0a17ba899edeffe33fd5b8be90d02c2032d9d6d9a612c037e40025fb96edc5bf565f7cd2ccc24

memory/1908-96-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-R1400.tmp\idp.dll

MD5 8f995688085bced38ba7795f60a5e1d3
SHA1 5b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256 203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512 043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

memory/3620-107-0x0000000002F80000-0x0000000002FA0000-memory.dmp

memory/4816-102-0x0000000004F80000-0x00000000055A8000-memory.dmp

memory/1908-95-0x0000000064940000-0x0000000064959000-memory.dmp

memory/1908-93-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1908-91-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/4816-109-0x0000000004EA0000-0x0000000004EC2000-memory.dmp

memory/4816-111-0x0000000005620000-0x0000000005686000-memory.dmp

memory/4816-110-0x00000000055B0000-0x0000000005616000-memory.dmp

memory/1908-86-0x0000000000400000-0x000000000051B000-memory.dmp

memory/4816-112-0x0000000005690000-0x00000000059E4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-PVENJ.tmp\Mon151a01e1ddefea03.tmp

MD5 6020849fbca45bc0c69d4d4a0f4b62e7
SHA1 5be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256 c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512 f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb

memory/1908-94-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4816-87-0x00000000027A0000-0x00000000027D6000-memory.dmp

memory/3620-85-0x0000000000F00000-0x0000000000F2A000-memory.dmp

memory/1908-60-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1908-59-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1908-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1908-57-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1908-56-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1908-55-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1908-47-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1908-46-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

C:\Users\Admin\AppData\Local\Temp\7zS04DEFE87\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

memory/4200-116-0x0000000000BD0000-0x0000000000BD8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qopwy0aj.wcq.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4084-126-0x0000000000400000-0x0000000000516000-memory.dmp

memory/828-127-0x0000000000400000-0x000000000046D000-memory.dmp

memory/4816-128-0x0000000005D60000-0x0000000005D7E000-memory.dmp

memory/4816-129-0x0000000005D80000-0x0000000005DCC000-memory.dmp

memory/1584-130-0x0000000000400000-0x000000000214F000-memory.dmp

memory/4816-132-0x0000000006300000-0x0000000006332000-memory.dmp

memory/4816-133-0x0000000074260000-0x00000000742AC000-memory.dmp

memory/4816-143-0x00000000062E0000-0x00000000062FE000-memory.dmp

memory/4816-144-0x0000000006FE0000-0x0000000007083000-memory.dmp

memory/4816-145-0x0000000007710000-0x0000000007D8A000-memory.dmp

memory/4816-146-0x0000000004B10000-0x0000000004B2A000-memory.dmp

memory/4816-147-0x0000000007110000-0x000000000711A000-memory.dmp

memory/4816-148-0x0000000007300000-0x0000000007396000-memory.dmp

memory/4816-149-0x0000000007290000-0x00000000072A1000-memory.dmp

memory/4816-150-0x00000000072C0000-0x00000000072CE000-memory.dmp

memory/4816-151-0x00000000072D0000-0x00000000072E4000-memory.dmp

memory/4816-152-0x00000000073C0000-0x00000000073DA000-memory.dmp

memory/4816-153-0x00000000073B0000-0x00000000073B8000-memory.dmp

memory/4020-171-0x0000000000400000-0x00000000021C1000-memory.dmp

memory/5088-181-0x0000000000400000-0x000000000216F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Login Data For Account

MD5 a182561a527f929489bf4b8f74f65cd7
SHA1 8cd6866594759711ea1836e86a5b7ca64ee8911f
SHA256 42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA512 9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 605b50d3a433c4ce3111c0aed99efc71
SHA1 bd1852cdfe9282965cf68ecaedcaa1a880e44f63
SHA256 4d461bbc08f1710b05723f7cf0499d483013c3bae2efc8415b25fed4dc8f8396
SHA512 dea6a503a52c3d459e04963687cc18ad59fd103b1c0decdf4f834974e714fce524267452669e9b4b892ea7b1a26e1c2624a1f92c1d0bfad60aec8b7a5bcbb21e

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\wasm\index

MD5 54cb446f628b2ea4a5bce5769910512e
SHA1 c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256 fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA512 8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extension Scripts\000003.log

MD5 891a884b9fa2bff4519f5f56d2a25d62
SHA1 b54a3c12ee78510cb269fb1d863047dd8f571dea
SHA256 e2610960c3757d1757f206c7b84378efa22d86dcf161a98096a5f0e56e1a367e
SHA512 cd50c3ee4dfb9c4ec051b20dd1e148a5015457ee0c1a29fff482e62291b32097b07a069db62951b32f209fd118fd77a46b8e8cc92da3eaae6110735d126a90ee

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extension Scripts\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extension Scripts\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.82.1_0\_locales\en_CA\messages.json

MD5 07ffbe5f24ca348723ff8c6c488abfb8
SHA1 6dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA256 6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA512 7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\mode-ecb.js

MD5 23231681d1c6f85fa32e725d6d63b19b
SHA1 f69315530b49ac743b0e012652a3a5efaed94f17
SHA256 03164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA512 36860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\pad-nopadding.js

MD5 0f26002ee3b4b4440e5949a969ea7503
SHA1 31fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256 282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA512 4290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\jquery-3.3.1.min.js

MD5 a09e13ee94d51c524b7e2a728c7d4039
SHA1 0dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256 160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512 f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\content.js

MD5 e49ff8e394c1860bc81f432e7a54320a
SHA1 091864b1ce681b19fbd8cffd7191b29774faeb32
SHA256 241ee3cf0f212f8b46ca79b96cfa529e93348bf78533d11b50db89e416bbabf3
SHA512 66c31c7c5409dfdb17af372e2e60720c953dd0976b6ee524fa0a21baaf0cf2d0b5e616d428747a6c0874ec79688915b731254de16acce5d7f67407c3ef82e891

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\background.js

MD5 8294d61142f708c8cae2d61a92288946
SHA1 d5a53c0f9c348e6527d21e88b4ba8086197a7d4f
SHA256 55a046e4982c4f6c0438f143712a26e445cf370c9b80900309c9a32e68ad3266
SHA512 70fe3225a8c1fa34e9b00905df3939dc79d12f627f179530f159cf61fd68535da94d57c37cf32ff0ad9dc8dc7e26a9ffeba05f1ac03900c4d3cfe234dd899245

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\js\aes.js

MD5 4ff108e4584780dce15d610c142c3e62
SHA1 77e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256 fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512 d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\manifest.json

MD5 9d21061c0fde598f664c196ab9285ce0
SHA1 b8963499bfb13ab67759048ed357b66042850cd4
SHA256 024872f1e0eb6f98dcbd6a9d47820525c03aa0480373f9e247a90a3ef8776514
SHA512 f62d333e6415be772751eeeaf154dc49012b5fc56b0d2d6276a099d658ebe10f3c5166ec02b215ae9cd05014d7435b53d14b98a20e2af83a7aa09a8babe71853

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\icon.png

MD5 c8d8c174df68910527edabe6b5278f06
SHA1 8ac53b3605fea693b59027b9b471202d150f266f
SHA256 9434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512 d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hemlmgggokggmncimchkllhcjcaimcle\9.86.66_0\background.html

MD5 9ffe618d587a0685d80e9f8bb7d89d39
SHA1 8e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256 a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512 a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\en_GB\messages.json

MD5 91f5bc87fd478a007ec68c4e8adf11ac
SHA1 d07dd49e4ef3b36dad7d038b7e999ae850c5bef6
SHA256 92f1246c21dd5fd7266ebfd65798c61e403d01a816cc3cf780db5c8aa2e3d9c9
SHA512 fdc2a29b04e67ddbbd8fb6e8d2443e46badcb2b2fb3a850bbd6198cdccc32ee0bd8a9769d929feefe84d1015145e6664ab5fea114df5a864cf963bf98a65ffd9

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_0

MD5 cf89d16bb9107c631daabf0c0ee58efb
SHA1 3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256 d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA512 8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\index

MD5 7871d57436de3df3f18360417f2c3798
SHA1 35ceff73d7ce7b02455fb6ab87ccd6e71e9e5f1f
SHA256 49fe719cd2b1f7bf361cfc21d28349c41cb3ee9d1e0aeebadf6822df8a452dbb
SHA512 a564e69c3b60b7062adb084c24a84daea6838443556dcf7c4ee2e837590d2ffb569254e864b96f6da09ab2ae77a1460dbaf340ee7302940f9eba7ac87a81ff62

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_3

MD5 41876349cb12d6db992f1309f22df3f0
SHA1 5cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256 e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512 e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\GPUCache\data_2

MD5 0962291d6d367570bee5454721c17e11
SHA1 59d10a893ef321a706a9255176761366115bedcb
SHA256 ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512 f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Shared Dictionary\db

MD5 491de38f19d0ae501eca7d3d7d69b826
SHA1 2ecf6fcf189ce6d35139daf427a781ca66a1eba9
SHA256 e58156bca5288238d341f5249d3b6c91ab37cef515358953b435339100d0596a
SHA512 232f5df71e8ec35e500ac81aa54a87b3523fe8a32168096a2a76f08e5c7868100b3cdc5155786ead489aac440beee3f84ffa43d226a5b709c66012923b20c696

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\CrashpadMetrics-active.pma

MD5 9a31b075da019ddc9903f13f81390688
SHA1 d5ed5d518c8aad84762b03f240d90a2d5d9d99d3
SHA256 95cf4025babcd46069b425449c98ed15d97d364b2461417caa9aa0c13cb372e1
SHA512 a04726a429ae727d685f0836327c625d2f18d6327253216a9a31265a324b68b06bec4e7f1b744d261a0e67fa0a90c43719aeda9d2998f42525b0ff5640c7bf1e

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Crashpad\settings.dat

MD5 1fd2bcf7be677e004a5421b78e261340
SHA1 4e5abd04329ee1ffaebe9c04b67deef17f89ff84
SHA256 f539c848f584add20b43d5daefd614526b67adbf22b0c89eaa7802a8a653cd31
SHA512 929499946e38281bd808b37b362c4a86f3b6382eb1ecd5fc094410d3688906d14a114ca930a2cf38b6241ab734bc5959e6fe541270d47ca9538e82a68c99cc77

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

MD5 3b0090ec2e1bd92413dd3f4d7e57f096
SHA1 ccd4f09c9d2dc161c46871b75756b6057b6ab27d
SHA256 0e694e40120a9d3b5fc04b25e3ed88fc5c3d7b68fe6382d5afa020a3d8cefed9
SHA512 e6f6f5f831ec341a6be70f46d12f40fb02c21d72db9df4a35c84cba3dd0fd49a59fd8cabd1a9e0d56e570d013a4e9270f6df8b3d3d5457e94990c5ef81b7272d

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Variations

MD5 961e3604f228b0d10541ebf921500c86
SHA1 6e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256 f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512 535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\ShaderCache\index

MD5 9621d3749fd19ba2ae290b679e8995fd
SHA1 0e26bde909949518d487c650773a962813f5dabd
SHA256 e4a73f64860d30710be6f1c7f857de64125e80462bb2e35f2c11ac9c5d9dce9a
SHA512 96a96b9f3cb61c91f76ba294650556cba781807243e350d3b80084fccb084f93750e1ea139d0d9c3c7833a8b24f92fb91a7eb561619620b7c7a6be47f18e801d

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\data_2

MD5 727ddba6c69d2e855820b57ad8a5cda7
SHA1 2d53b1c7e3ab91a0c3a33cfcf75b7d9d3bf1e202
SHA256 20b34e761ac58e4c1d3be056e0ca65e1372143e4dd4fad25c19f1f45f2e2fc19
SHA512 e3137d4f4b872046c2c0edf72b4a8f14751a2f265ae0703409a78ff2bd54f877924ec445b550e69d09171503cf47e6ddbbd341cfa7e935fb985add2545d3bc98

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Web Data

MD5 e3bad5a8407ce8be2e003acd06598035
SHA1 a6bc025a692ae74493b231311373d214b72fd9b1
SHA256 29a8f30850aa6f08ad492c71594de5844e11ab1a9bc4b8e0432b137fb8ca2d69
SHA512 cce663e7318c9a9723a676e100dc77c47399f3ca3c25729781eddd4c63e7797c93ccca34c49a0eb725806691ffbec2699dd7d450f14cbbaeff8a3bb07a57e082

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\data_1

MD5 108f10855afe379889c42582a61c5f03
SHA1 861fdb89d4d3fab6baf8816b720a059a91327b3e
SHA256 f75381abe3fe5870919226aaf93cf08f602bb518c41071fa5ea29cb5a6b2a970
SHA512 8530acf14050db51d6554422e992e7ecf3bf2e90d4e275acdbc5c39e26c37c916c0c95885dd195d86d76c851822dfedd7c499debc8a6edd614f319e10ffd6163

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\data_0

MD5 2ef3b3429afee8d0f664a0a1d873b90b
SHA1 f52cc4cccbfbadad689fe83c48e79737b18dc2c1
SHA256 499bd206219ad0529b35353d912008513ee7f348942d7f928a7b5a8c60dfee2d
SHA512 a203bba89838e8047822569d2b6f420fc70cd02dbaf613e94c7befb6e70ce2b8302c21b1e0b35140875940657d0bc37b2a1538e5d06556a342b5efac43bcb41d

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\segmentation_platform\ukm_db

MD5 3979944f99b92e44fa4b7dbcb6ee91c2
SHA1 df2161c70a820fe43801320f1c25182f891261a4
SHA256 001d755b2b560945440023bf4ebfbda797cf5106419ac7dd270924b322f3ecf3
SHA512 358e6dee698a63c2490c2fb5206516766fd8ace8f3d523509c29ff76aa6a984cb6381468f15bb4b9c084d9a470298b4cc11b0970e671ce0316243069ac4c8590

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Visited Links

MD5 feb9fc088db0ce4691985d033a3eee37
SHA1 e2db2f09bb0993d65661aedc4e8f8049bdb623d9
SHA256 8c7ea7f76fe937f73168e4bdfc8ed85eb9ca9394e0ca1d9db6aa569eb02671db
SHA512 97e051a5d751bf2d06995b614bad390299b6d542a2edb1ebdbf26b8ac4d75c43ed5ee95ee0745fd9b67247f6b84ae5d9f0bde649206d9127376a0473f7d68766

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Favicons

MD5 b40e1be3d7543b6678720c3aeaf3dec3
SHA1 7758593d371b07423ba7cb84f99ebe3416624f56
SHA256 2db221a44885c046a4b116717721b688f9a026c4cae3a17cf61ba9bef3ad97f4
SHA512 fb0664c1c83043f7c41fd0f1cc0714d81ecd71a07041233fb16fefeb25a3e182a77ac8af9910eff81716b1cceee8a7ee84158a564143b0e0d99e00923106cc16

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\History

MD5 f310cf1ff562ae14449e0167a3e1fe46
SHA1 85c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256 e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA512 1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Sync Data\LevelDB\LOG

MD5 357ca1ce1571d7e40b9dcc00f4658511
SHA1 206c80206bbe939c3c771ea4bdc205cdc7d03459
SHA256 817c0ffe3ad295fa315d0ad0da2f3fbf397ba9c36867413640b14a5a0e239642
SHA512 ebe6ddb5c0ad1c8c3a913e3a22808cbf083ee466ac7f3836941689b7f59f408be9f472a38c0f1d81b226f57d4258917afbf544859659fbc090e5394f8875134b

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Sync Data\LevelDB\LOG.old

MD5 48eb185c645b9141720280223c21ee89
SHA1 5a80ac000d537de5a06530442c545ee4db9cace7
SHA256 49e612e6b341344ab148a344a675cf1e260a9ad099f8daa211b901aecbdfb738
SHA512 782e31ff51bb20696dc0d7534dfb8ea1e26ca08d4eea277dade309def34b4bcc7cde3f76ac72c780902bc3688cc31d2e9adc11d5be310971d4e0665528069a1b

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 426608cbbef430e8daeb6f89feefa10b
SHA1 2d1ce6b77d8b212da1e5479b385b51c9a77aa858
SHA256 47556b9652515aa1439774eb1c579968f8a83a4998d4944f3f33f7c4a03ceff9
SHA512 2a89ea194f9379bb9887f9859b829af33f16bf413752e2e34aff0b8c734b1aa8eeb138a7e04ed6c392c63e5d6c111e935f870a9843ed0fc13a96f6b2ae3620ca

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Last Version

MD5 ef48733031b712ca7027624fff3ab208
SHA1 da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256 c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512 ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000005

MD5 c2b78d7a388c991a5eb6f97e37439209
SHA1 9b22565bce9903721cd4c3208e543275f0d8ccb1
SHA256 6b1be68af806d8ac07f0957f855751d5cf2b99457cbba0da14b8fdb2c1c77b96
SHA512 e4b0b7b1ce9a1a4387d24165bbb47dd8ec05d5a1d812dcda8bdf146a7a394afff162c44caac61d8da4bca7a125d9368c14beccfe37e8357c7a8176eec7aa990a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000006

MD5 3a39bf2e18851a41ee26c86f75f8068f
SHA1 9bfc4c94c688457868116ff157bd794755c8a664
SHA256 981668f199e04f2d0d36431203ef9a8882a76f0736d3b18b2ff2766e61267971
SHA512 1deb2a1dba4073f774daa5d151a918ac47290515b5ffedd5b49876181bc3163a80d4e5ba77ecd16ef783feb17f956ca48280dc7667ac74b7a87358440939bc49

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000007

MD5 d9b4eb55a6805bb6ea88239e5df60678
SHA1 31e85f0ff95121fb98dad53069d802cf8518b191
SHA256 16ca9c6115bd8d74d7d246569f59b98e5f0c3ad90f45faf476887e3d38b3345b
SHA512 0a2549deb6e611cc0da0876f143f8bd7ea88274448c66cfdf9344431bc529f78c58e99f779b6c907dbdaf1dbc6783a075aa49107ad96633b1e97a73d88fb6a28

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000008

MD5 aaa60f646bfacf64f15a89cf5ed5fbb8
SHA1 40cf2a316260ee4b0e034cd56c155a846143e1ba
SHA256 357ab74706eddf984f87d48ae8576bf3816fde687c638ff0dd175c5d59b505d9
SHA512 b95a25eb189531449a3104b33881651d62248e1a5fbd6e55ea9dced29fee4d9cda10d7f4bb99db2194483f5728af9d365423332fef727481079e2efac47471f5

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000009

MD5 11716d94efcfd9fcb9e27e54b5f06be4
SHA1 4e1fecb37efbcfcc00bea2d1d2e703f8c6e061c4
SHA256 c4b10941465e040ede257b0262101894676dca0b9ce6168f9af2862de0e2f3bb
SHA512 3de65741a466b31426bc0f388de4286d68a4ae7b3b54fd0b65def0b1566a929bd34a29b069f65dd7d649e1d7ecfb45e1f6214760f3c2fdeae51bcb9f9271e190

memory/5088-1487-0x0000000000400000-0x000000000216F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000a

MD5 4428ac57ca29780cc903f69e2c3bd537
SHA1 e3537651edf36517c8a748d214c3a3cedc5eaa22
SHA256 a06c544fb912b292bfa79ac36206bb1a6ab32c4fb56543ca6fc1a90ddf28beae
SHA512 7f543d2067f6ac7a3e9eeff06e4df20bf2e76ece910712ddc5dc13964896a77342893ed27395fe2392be86770fe2ad7d8d18e4c7e6b9fb177b619f811258d442

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000b

MD5 aaacec12527fc2477120f0a4925a5326
SHA1 e143ba9eed82b0fa9b48b5cb22bdd8098f114fa7
SHA256 5d5ff7dc2fc1265d6bc8cdeef481dd1ee81cfac3ad055ca26ca1874b2d3e98c9
SHA512 1ca97f116967aff733c178193eb904506c3a14575d7285f7c94ee7aa6b520fb0c041dca53df2838d04a516ac0a549237b45076ac2df477ca6555c08eb43c2da7

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000c

MD5 48370e48fe1da79e65c4becce21dc04d
SHA1 134c4c7d25b711f09b2e118b7fd486a28a296f6d
SHA256 293f090f1d82343a99cffbc84fd7f00b9f981cc947ba4deed4113e1d176cadc9
SHA512 b5777fb4462f60c334736bb024966a11af70eb53ff6de3a3d78ebd40147f20a8d980de1bd014e181fc32e9858c3f96e15a1b45e1df10425dd451d9d14ff69568

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000e

MD5 048a2dcd767244f6555f925e6f18edcb
SHA1 492f8e62e714d9d1989ca29b46d82ccedcc06021
SHA256 24afeecfeebbebf2fbac8868cf745894a46e6a694585964f639ae937decd479d
SHA512 5f206c5b5872c47a1972a4f9d33341590426308920328de928982d0e77d1acf4efdb2561410ac3cf4457ae0345ca858b11b3ac79660715a6dee24fa549612557

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000d

MD5 45352365e364288653dd4014cc383a14
SHA1 828d455287ccc806bcd658f283e29d8cebe646e5
SHA256 ee2b63178958aa47bde61c9947251f993ae59c326d823e1f53404c9fb52e165a
SHA512 6da1e31a95c3559d7630ebb22a77aaf818cf09a2b096eb9e939169d7c6980980267d8a705bcdab90ab116e2ea1ef005c6d66536f643064a5aaa7181531feb35c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_00000f

MD5 420cf9772c2c3c1afae383f8d0331eb2
SHA1 cb267dbe6773789a3281154e1b07e166f1472a98
SHA256 768f87f6c053c72b12706fb75279662639af9cca2a9e719db01ea8904efc0baa
SHA512 27d689271f27a258fa0cd1e6a434e83d065690b4ba96d52fc6e62bfc44b70b4ed428e707be23e22ddafd1a942df9d647e8bae08a88cf1c2a9bf833bbc69afe2a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000010

MD5 ff456efb5ad2e79cb287dab75e5979f0
SHA1 c50f220031af5065bf5d14551beed1ea920a9a57
SHA256 619d5e3c0d9e1886deed6eccef3a70a1a339597cbf71c06806a8491a4a6114b3
SHA512 4f9d793f5d7fd1c10a4480c47ad1be0f40baf2b8dd91f3e9026fa35bc54fe49ca00a5deb346d87ba46b2b2d5279a7f71d55d15d636be47e979bcbe26bc3270d6

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000011

MD5 cd613f68da3a6c71c1ca0c437cacefa6
SHA1 df3af9a42bbe9ad7eddf31642f9075bc7776c951
SHA256 120687cc293e37d3a9da6ed6b6cebb6236039b671874b4247c8ca3007b6ca44e
SHA512 c0ab9707687508126a4b1a9c4d7f14dc3fa8b717d275a79302d6b751cbeeaf1d5ba902f9629c82eb952a41952ab079cf842043562ef393109cb6fd86e5b508c5

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000012

MD5 14e742240f2223f4fd0271766ae9f63f
SHA1 6373022ad7bf529a23ea7ce4ce2c4a5abcb9c6cf
SHA256 b0185019c366afd4711e48589d482953beb4a144d7458b61234c1ecde877a98d
SHA512 2f78c72b6d87e60a0b4618f50cb7b5c7d68724af8b24d8dd75d1df16ab223b906ad32e5459d2f0125f088eb6faf55f4d0ba5dfd1f4ea1bc43989cd3f780f85fc

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000013

MD5 4dc3909221923c5a84f62d35ae89dc6e
SHA1 0950f707b004a04d8338340f84e67e55546f628c
SHA256 a15fabcbbd5aee45f848adb2bf739ecaf5b4143f7f231bff42f084337d0b027c
SHA512 929824156232e08625fa74714328674cf6fd36888ef1341e459e31b573ff3b79027d4c231786ac68ab90d3fa5da8f2dc477fce5840dff7b0547db6af4bca1e7a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000015

MD5 c1164ab65ff7e42adb16975e59216b06
SHA1 ac7204effb50d0b350b1e362778460515f113ecc
SHA256 d7928d8f5536d503eb37c541b5ce813941694b71b0eb550250c7e4cbcb1babbb
SHA512 1f84a9d9d51ac92e8fb66b54d103986e5c8a1ca03f52a7d8cdf21b77eb9f466568b33821530e80366ce95900b20816e14a767b73043a0019de4a2f1a4ffd1509

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000014

MD5 3669e98b2ae9734d101d572190d0c90d
SHA1 5e36898bebc6b11d8e985173fd8b401dc1820852
SHA256 7061caa61b21e5e5c1419ae0dc8299142ba89c8169a2bd968b6de34a564f888a
SHA512 0c5f0190b0df4939c2555ec7053a24f5dae388a0936140d68ed720a70542b40aaf65c882f43eb1878704bea3bd18934de4b1aac57a92f89bbb4c67a51b983ae3

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000016

MD5 b63bcace3731e74f6c45002db72b2683
SHA1 99898168473775a18170adad4d313082da090976
SHA256 ea3a8425dcf06dbc9c9be0ccd2eb6381507dd5ac45e2a685b3a9b1b5d289d085
SHA512 d62d4dddb7ec61ef82d84f93f6303001ba78d16fd727090c9d8326a86ab270f926b338c8164c2721569485663da88b850c3a6452ccb8b3650c6fa5ce1ce0f140

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Cache\Cache_Data\f_000017

MD5 9978db669e49523b7adb3af80d561b1b
SHA1 7eb15d01e2afd057188741fad9ea1719bccc01ea
SHA256 4e57f4cf302186300f95c74144cbca9eb756c0a8313ebf32f8aba5c279dd059c
SHA512 04b216bd907c70ee2b96e513f7de56481388b577e6ccd67145a48178a605581fab715096cfb75d1bb336e6ad0060701d2a3680e9f38fe31e1573d5965f1e380a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

MD5 5535595292d531709185fe40036a0366
SHA1 b8cea1495402ad104ae0989c1db7001b8c500d87
SHA256 5e3012d79510a99ede22885ef1ce8f6312ffcf9ebdd91756dca8ebbc4d8a480a
SHA512 d8a6535a6db8466a0c17fb3d7230ec07728cb96fd0dba57185a49fae2bdb12a49d82ffcf2eb04e39f995b76c4af60cbad427a2a93889dd26dfc96596469ef1b3

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\42f51a2d-a728-45d5-b5ef-395852368ebc.tmp

MD5 10b8163578f8d414a2c500a7100e1fd7
SHA1 0753c7a1df85bdb2d78a0ea5fc4ebca66ed6d4f5
SHA256 15c209dff7c0dafe2c985684ac1ae12cca21f61e347a140d8202f7d4f529ee21
SHA512 b11105f53405df329666d29435be809e1decc8fc6602b3588a23a772e24ab7204ae98850dc9bd23c3853c9d645f512d799800a64b19a161ee19028c815468881

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 7e9b904966717bc9aab152dda7f219b4
SHA1 d7e42ab6296382cd5720b8d3ed9f67c9b6440de1
SHA256 0183beca26536c209bdbaab5aa76ec852a18ae4d6d7939ceee783bbb1daab1fa
SHA512 e05a2db1d64c2be7c213634fda3884b535c4ceae5565c45c64fa67e7bf0bda268e3ec44c33831e211296baf99efaba71285e861f40b2e0ee66399d2ab90123fb

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 555e49d2805ced4e59d6e0c01d1e5427
SHA1 75f37788fa91f009166825db3c1cc3de78d1d628
SHA256 311fb63732fe3902f53ba5a8986bd50228f1444cf243b55e27cbf4dbc128b5f4
SHA512 05e70a32938127d3401c0e9cab45f54e9d297e7ae37a4890bf36413ceb02937edd1939d2272f1d446afd376922479271add26e4fb0206a0fdbba2d0f7968c8fa

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 6da0e232a77b4ae28b4857656c730b02
SHA1 9d9389e0ef1860c6ec3ac1fcc7184c722049ae4f
SHA256 09640d7f565bbe0e1fdd62c268c8415001174980c88f162f4f5a5518be959859
SHA512 47f512ac5000adce7654cd5b4cdedaea0ef14cc3c913cd4fe87be879b6274a90a620ec4c552a25f9d69e0db9dba7c36bf37dd26f6ba384eeaf86e3717083f71d

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\js\index-dir\the-real-index

MD5 20d65d6328c86e929ddd613d201f304f
SHA1 cb479d6d3b7533e5923db600bdd40763e572f03e
SHA256 49fdc5d0a14c3a9f8139b4e36d04d2b2261c4e7979d8b8f82973f30f54b40533
SHA512 616a04fa7cdad1b681f967856e2cc5c0fbf8480344d1faad900351ed6f8f90f9f5491910d0b496cf3417aab818f20377374d31c719e14b1b1a0961f5fb3fff1c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Code Cache\js\index-dir\the-real-index~RFe585d1f.TMP

MD5 179d9677e3912e6360ec48be10ceb140
SHA1 25a467c2a1a6e6123dedb07a20c41827b20d42d4
SHA256 8cc97b01298a1cb8cc4629a3280bc2657d90169d3e3ee88ba804d97bb5fe8c34
SHA512 bfa1029568b34a75febbc5b89463597b689ec93b7d4a507dac36721fb0efc7f5233bcec0bd683b94f6733c6304ca2def3b55e3cd1210603754e2637e2ec992ef

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Local State

MD5 97fad776bf7657140bce7f4ab1be3bfd
SHA1 e2c6f7f285557ba46565ff3c5eff99519c2f2dae
SHA256 254318c423c4dcbcb7d5a7e2a36c2cf11093a1a50e2d32c81e856aca3f6ec93a
SHA512 0e7f87654bcd73e741d646d567c3e5c0f9ce83645520b81d86fa602054bc76d4b20da473f9abf9713fc99ce0839262154d355d34bc03f40f05f5584f5f407e2a

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 f40bd172650d41ed5afa255ff8d14c42
SHA1 90146928c5c81cd60efa919eefb5001539adfb23
SHA256 9b0b341c8c482a131dbebffa30d37287a8dc3fbd2933c7ff401d6792e4717fca
SHA512 8c4684a2b6e827627d64dfe38936c5efee6c0b0776734060169d492e9f25c7f6cb51401bd662795c8ef19b30d7db0a1082c92447d0a1e5e4ba12b6831dc2a879

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 87fbcaec2fd6d58448b63feb4fd3bc76
SHA1 e6e17507fa77c5042376d14ff31dd62903750467
SHA256 df9f511206e932972ddfebafd3bc02a29a402324d89fed25d1085e0ee3a7d95f
SHA512 8c5a23a831b9777237e3345890a01959223f7e737b91a79eb9d924a13bd3d879bcca57dff6ae5f7eded2dce8c1afed0b0078c5dfb4e799dc11df94be6f0df709

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 94d88011ab9c0f36411b45e41b16abce
SHA1 6ed5f9c710d9238ec56afb42e5bbf2325eca6a5a
SHA256 aa09bc210db9efec32266abc8d6afa7a3edf241f87488cc7bb45dd1ae88fd39c
SHA512 5192d9aa58464d5e4c6e306acfc5de608b821ba143b22f81c117ae10b648d14b23a6001f1e0dae37923c126e2dc6e011b24a6d4933b1812e677a5163b679cc5c

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 f615275d13c4f90f432a4c5c157e7273
SHA1 d4c1e1f766f9455bd188fe1b7374e34fa7c3583d
SHA256 9d7a00b5870b05f833183f8e3d80d284bd4084083834105faef351f6716e4f79
SHA512 ab60c5e36869dca356e42d935188053322fa9e5312c8d1fb21257c60fa176504ac2032ce3b21369fc381709bdcef9663dbce329e59e241b23461bdb54fc85198

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\Network Persistent State

MD5 9f3d8ae937a1ee7eaf8be8707f625d67
SHA1 b46cce5e8fd153ee4b4a0b6bec4f07bcab4ebe98
SHA256 57060d8fac1cf7789c481633f585da384ea5cea971dcdaca049dc20e80854c70
SHA512 7e4a28b05e33e30cbaaed215e18b1eb83a92c3c0107c0bcd5760b31a8d17dc9f909b115ea277449f8c5d1283fbabbcedfa46f17f3e80ec466941e8bed78ac7a8

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Network\TransportSecurity

MD5 22e32cde8c3d7c6fa84b8383f8fbd03e
SHA1 ae1349c86a72e4ecaa28f01f55ab2c7a383194a3
SHA256 3d90b5ebdbb7db75a806ad7112925b943f8585358769227fb408786b61c42f8f
SHA512 910ef886d02af89061c76eca6a695628b51213b4e199cb11d646d34637acc280c5ffa9a11a4bcc97db624a5f65793126deb51d14dbb8c98e7624ea4b07568d28

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 baeb3771cfaf577f3b8195f4ee0fd475
SHA1 9070a503c20a76d1205731a506471025e5b1b9dc
SHA256 a2f0d1a7273687373150b981df468ae4d7e76ce24b517e20fe3ab473f2c07eb0
SHA512 6c138aa5240f651dc8d108863de49f6300636acb067434030296e5c49550828a33f069dbbf3ba5189d5196c49d627a40262f4c1f5cdb288c3396d8af06c298f3

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 d55155811e4034730defcc295602b17e
SHA1 2fb4981f4235a32668e0f3862b40eff9aae5bb2f
SHA256 06e71112a930cd66da2847963b89512105002a377f101fd9438d16b91d97c624
SHA512 02fdbb42d5fd91a9698f3451dd94ef8f561168e8ffd0bf0b1906aefab75786474081870d5e4376d06ce4311f3b16f073063d87e2308b878e1b7b65d9a6af07e1

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 7ab4a37d65ca79bb1b471e7b7ea88126
SHA1 51a8a55f5bfb33c14f0a5bd1c224d1f155a36868
SHA256 c055e6d9b99ae94b1e73096fecbba870834f7886b464ece175670c5088beb1d6
SHA512 2f88ec4ffe88e88463d4fcd5c63746c132b0db356028a45ca10dfd383d8ab10350cd03ec7ac0d915569537dad9a439cb8ededc7e5776de44b77cf0f0cce06cc3

C:\Users\Admin\AppData\Local\Temp\cghjgasaaz99\Default\Preferences

MD5 3523d52a3e5f463ab381fb8061d4f502
SHA1 6cff58ea3271b849bef53ea5b715c23e69fdb65f
SHA256 340f2582430bb35a774f71df3f27e646e7e0fc3a8f6ed21470740f989a1aac23
SHA512 71e4646382da61c95971939abd29044fa5cefae79c5ce126833b781ac0d5b80968301acc368c3845d4851184d2b847c159aa7de8ca18dda7404531555b501b0a

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-10 00:27

Reported

2024-11-10 00:29

Platform

win7-20240903-en

Max time kernel

148s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe"

Signatures

GCleaner

loader gcleaner

Gcleaner family

gcleaner

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

OnlyLogger

loader onlylogger

Onlylogger family

onlylogger

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

OnlyLogger payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15818fcb352.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15818fcb352.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon151a01e1ddefea03.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon151a01e1ddefea03.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1547d11c23777f6e7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1547d11c23777f6e7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1543669f69f247e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1543669f69f247e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15f819eb2300d8eae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15f819eb2300d8eae.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon151a01e1ddefea03.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-E4ECK.tmp\Mon151a01e1ddefea03.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-E4ECK.tmp\Mon151a01e1ddefea03.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-E4ECK.tmp\Mon151a01e1ddefea03.tmp N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up geolocation information via web service

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1543669f69f247e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-E4ECK.tmp\Mon151a01e1ddefea03.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15818fcb352.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1547d11c23777f6e7.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15f819eb2300d8eae.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon151a01e1ddefea03.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1547d11c23777f6e7.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1547d11c23777f6e7.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1547d11c23777f6e7.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15f819eb2300d8eae.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15a53317618120.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon159345e4f6bd10e49.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2348 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe
PID 2348 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe
PID 2348 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe
PID 2348 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe
PID 2348 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe
PID 2348 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe
PID 2348 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe
PID 320 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 3004 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2844 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 320 wrote to memory of 2144 N/A C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe

"C:\Users\Admin\AppData\Local\Temp\446f021fd7d29650c1c5dc596bcb48d9662c624249840e847c316f7e775da766.exe"

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon15818fcb352.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon151a01e1ddefea03.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon15f819eb2300d8eae.exe /mixone

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon1543669f69f247e.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon1547d11c23777f6e7.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon15a53317618120.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon159345e4f6bd10e49.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon1590e659d520c442.exe

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15818fcb352.exe

Mon15818fcb352.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1543669f69f247e.exe

Mon1543669f69f247e.exe

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15a53317618120.exe

Mon15a53317618120.exe

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon159345e4f6bd10e49.exe

Mon159345e4f6bd10e49.exe

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon151a01e1ddefea03.exe

Mon151a01e1ddefea03.exe

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1547d11c23777f6e7.exe

Mon1547d11c23777f6e7.exe

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe

Mon1590e659d520c442.exe

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15f819eb2300d8eae.exe

Mon15f819eb2300d8eae.exe /mixone

C:\Users\Admin\AppData\Local\Temp\is-E4ECK.tmp\Mon151a01e1ddefea03.tmp

"C:\Users\Admin\AppData\Local\Temp\is-E4ECK.tmp\Mon151a01e1ddefea03.tmp" /SL5="$60158,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon151a01e1ddefea03.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 972

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 sornx.xyz udp
US 8.8.8.8:53 a.goatgame.co udp
FR 217.70.184.38:80 sornx.xyz tcp
N/A 127.0.0.1:49263 tcp
N/A 127.0.0.1:49265 tcp
US 8.8.8.8:53 www.listincode.com udp
US 8.8.8.8:53 safialinks.com udp
US 54.205.158.59:443 www.listincode.com tcp
US 8.8.8.8:53 gavenetwork.bar udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.134.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 romkaxarit.tumblr.com udp
US 74.114.154.22:443 romkaxarit.tumblr.com tcp
US 52.203.72.196:443 www.listincode.com tcp
US 8.8.8.8:53 cleaner-partners.biz udp
US 8.8.8.8:53 remotenetwork.xyz udp
US 8.8.8.8:53 startupmart.bar udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.2.46:443 iplogger.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.187.227:80 c.pki.goog tcp
US 8.8.8.8:53 best-link-app.com udp
US 8.8.8.8:53 www.iyiqian.com udp
SG 13.251.16.150:80 www.iyiqian.com tcp
UA 194.145.227.161:80 tcp
US 8.8.8.8:53 yip.su udp
US 104.21.79.77:443 yip.su tcp
US 104.21.79.77:443 yip.su tcp
UA 194.145.227.161:80 tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 2.19.117.22:80 crl.microsoft.com tcp
UA 194.145.227.161:80 tcp
UA 194.145.227.161:80 tcp
UA 194.145.227.161:80 tcp
UA 194.145.227.161:80 tcp
UA 194.145.227.161:80 tcp

Files

\Users\Admin\AppData\Local\Temp\7zSC29060D6\setup_install.exe

MD5 ea63fe7336450250809db0d2056f724f
SHA1 f8d95c734dfe41ac2584d0efdb68c93c759c22d6
SHA256 054cd22c12aff13859ec9ae1a10375bcc3914673513c03dbb3592d413b4dba0c
SHA512 fd9ffde6eb860a1f89717ca9a7f1bc341f938b32ebaa8d71ca434315df312993f5a506039308a19c572861a92763a12bfedcbbfe1fddaf35bdc202bbe344bb98

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

memory/320-49-0x000000006B440000-0x000000006B4CF000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zSC29060D6\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

\Users\Admin\AppData\Local\Temp\7zSC29060D6\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

\Users\Admin\AppData\Local\Temp\7zSC29060D6\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

memory/320-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/320-64-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/320-63-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1590e659d520c442.exe

MD5 017877811696abe6571c60b8d8a13691
SHA1 3260dabc5f83fd6f2c8344924e61584fcf3a211b
SHA256 f231e40dc1d9ec5f3cad83a902c65ce5f55b3d50f308eadf1bc023bb7b09eda5
SHA512 9336cd5607d291a851a3e43ffbc8e0bd8243f4414321bedd982710435515358728fc6e9b325dcea214ae39b2c915f2b3345a9a49ccaba6b29274afd440806d52

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1547d11c23777f6e7.exe

MD5 06638b06846ccd816188d8d3b7ea2b63
SHA1 61b5b1bc83f4c6ebe4c101f3a155bb5f530f6d66
SHA256 4976845fd8e234461ee3c35a8fde9426182e1b1e11c9c153efaa908b98eda26e
SHA512 f6965a230b20a377c9cfb72ecdc0e91237fc5cfca0625baed4db8cc650340d4e8bd92a1f4db3949618b53d9ba4f388be25d3bf16a8231809ade467676bb734e0

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon159345e4f6bd10e49.exe

MD5 c81293b02eed12d70ef3d44a1967d083
SHA1 29757d92b5a4322e4df24c37cd7e2d040c8fa81b
SHA256 7b4dc1c37be2e23bcdc8219dc032cdfc662d4c696d9bc39589c8acb9cdba6538
SHA512 7d34f29805ecab94d15c84393a7927b943ae9402b9a5c6eb91f0a17ba899edeffe33fd5b8be90d02c2032d9d6d9a612c037e40025fb96edc5bf565f7cd2ccc24

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15f819eb2300d8eae.exe

MD5 92351261835372c9982d488b2eca89cd
SHA1 1f521a6a1060d0e1d944af6ce2f06bbda830fca6
SHA256 57c0708b04d7ca429c3ec96a3303b9c372286c3afb619b542a1cb34f13d6fb11
SHA512 fd9b82516033dcdaff2f56268bd54d9abe1b4896624ec319e9cf545a1437b3e85a2ea10663a248fa86e736629a9a0d660e071e3e7f8695041871217594fdbfcd

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15818fcb352.exe

MD5 4e027fbe31b8661f978f274bad3eb8ba
SHA1 d34f80232d77d60fc9e6a35e2c9ea818b9c16dd7
SHA256 c3252e6654504039a01dfceec291330b2672a1ed713438e3cd33d4e1b23a797d
SHA512 7b47a9cde2922cb127131d54c07b64ca631adcdaf34d8077f14b728bb33afcb9194d5b1f872626de5f6133c381ad4d6f552f892d5c46d292cac4ee56c4c49c2a

memory/320-66-0x0000000064940000-0x0000000064959000-memory.dmp

memory/320-65-0x000000006494A000-0x000000006494F000-memory.dmp

memory/320-60-0x000000006FE40000-0x000000006FFC6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon15a53317618120.exe

MD5 435447f64b76a53986ce5ba582f97c2b
SHA1 3eb4ddf1efb1071215958127ed76f8a5116b6cb7
SHA256 df41f4165d1a24655d563e14100d68850aeb21d17b908d7dae4629c2317a37f1
SHA512 07b66bd1804ab4bba1e87d1e9cc8d03abd069313d2f92981e8d2d0ea5343283ed0df932b1f6b9d92c16b34cb638b3790ee0000b3b05bcba95a2eab6b63b75de5

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon1543669f69f247e.exe

MD5 82e04f3fafc14a555130455dd9e48ce1
SHA1 18652d6f22efb1a04c3c22b2183f6d29d3000433
SHA256 ec0e69c6630b329e58ba6bfc82267a42d7f3671f1063e2664a0f386fd0b48f77
SHA512 67dca44f9e2f708a3e1faf04e705f7bda9508c2c8c9e766d748ba324f5c2636bd19fd089cc4b3741ddeace64c14876557dc86719932f47323a26abc914e3bde1

memory/320-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/320-57-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/320-56-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/320-55-0x000000006B440000-0x000000006B4CF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSC29060D6\Mon151a01e1ddefea03.exe

MD5 b160ce13f27f1e016b7bfc7a015f686b
SHA1 bfb714891d12ffd43875e72908d8b9f4f576ad6e
SHA256 fac205247d3b19b5f82f5f4d1269a5c047b6c9ad9f21cc51b4b782c2b08a3b87
SHA512 9578fc34807be2541aa7dc26acbe27211e96b42c6c4208afe195b19b08264dfeb3ea7fec637c759f062cbd5561c5140ecd68cd5c79efbb844d3b2639e336ca0c

memory/320-62-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/320-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/320-44-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/684-113-0x0000000001180000-0x00000000011AA000-memory.dmp

memory/2576-112-0x0000000000250000-0x0000000000258000-memory.dmp

\Users\Admin\AppData\Local\Temp\is-E4ECK.tmp\Mon151a01e1ddefea03.tmp

MD5 6020849fbca45bc0c69d4d4a0f4b62e7
SHA1 5be83881ec871c4b90b4bf6bb75ab8d50dbfefe9
SHA256 c6c796f0d37e1a80632a295122db834499017b8d07728e0b5dfa6325ed3cab98
SHA512 f4c359a9ebf362b943d10772efe9cfd0a0153c1ff866ffdf1223e16e544dfa2250f67e7a7682d2558761d36efe15c7de1a2c311bc67b162eb77394ef179924eb

\Users\Admin\AppData\Local\Temp\is-FTND6.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

\Users\Admin\AppData\Local\Temp\is-FTND6.tmp\idp.dll

MD5 8f995688085bced38ba7795f60a5e1d3
SHA1 5b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256 203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512 043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

memory/2716-128-0x0000000000400000-0x000000000214F000-memory.dmp

memory/2588-89-0x0000000000400000-0x000000000046D000-memory.dmp

memory/684-132-0x00000000002E0000-0x0000000000300000-memory.dmp

memory/320-133-0x0000000000400000-0x000000000051B000-memory.dmp

memory/320-142-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/320-141-0x0000000064940000-0x0000000064959000-memory.dmp

memory/320-140-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/320-139-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/320-137-0x000000006EB40000-0x000000006EB63000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabDBA1.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarDBC4.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

memory/1192-213-0x0000000000400000-0x0000000000516000-memory.dmp

memory/2588-214-0x0000000000400000-0x000000000046D000-memory.dmp

memory/2296-215-0x0000000000400000-0x00000000021C1000-memory.dmp

memory/2896-216-0x0000000000400000-0x000000000216F000-memory.dmp

memory/2896-221-0x0000000000400000-0x000000000216F000-memory.dmp