Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 16:15

General

  • Target

    1cea91d9a0771725646049205b621cd82ac26f325086156e67b0067945df6577N.exe

  • Size

    7.5MB

  • MD5

    7530519bb092b8efaeffa5fe0c98c530

  • SHA1

    46b46eab7c7df244e00b62ae71a58e8ea59ae764

  • SHA256

    1cea91d9a0771725646049205b621cd82ac26f325086156e67b0067945df6577

  • SHA512

    3e3e2751cccfb6addf85a5f656f35e3bdabc0b03dbf28d9782fd6d39460adea4ffeb4fcf512115d9b0485048cb4a18532bdd284b3a0c68bb53158a777f434ac1

  • SSDEEP

    196608:xqwVbwdkjjHPyoXYqMkV3xH6OP5hHnYtmj643Rl:xtBwdG7PDIqtVBHki

Malware Config

Extracted

Family

socelars

C2

http://www.chosenncrowned.com/

Extracted

Family

nullmixer

C2

http://hornygl.xyz/

Extracted

Family

redline

Botnet

media25pqs

C2

65.108.69.168:13293

Attributes
  • auth_value

    e792d0d7a03fceb57d0e07caa26bb34f

Extracted

Family

vidar

Version

49.2

Botnet

915

C2

https://mstdn.social/@kipriauk9

https://qoto.org/@kipriauk8

Attributes
  • profile_id

    915

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Fabookie family
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • Nullmixer family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars family
  • Socelars payload 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Detected Nirsoft tools 5 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Vidar Stealer 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cea91d9a0771725646049205b621cd82ac26f325086156e67b0067945df6577N.exe
    "C:\Users\Admin\AppData\Local\Temp\1cea91d9a0771725646049205b621cd82ac26f325086156e67b0067945df6577N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3580
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2376
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3256
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:696
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon03f186a0d10.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03f186a0d10.exe
          Mon03f186a0d10.exe
          4⤵
          • Executes dropped EXE
          • Drops Chrome extension
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1604
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c taskkill /f /im chrome.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3468
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im chrome.exe
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4384
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe"
            5⤵
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:4360
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbb5a6cc40,0x7ffbb5a6cc4c,0x7ffbb5a6cc58
              6⤵
                PID:4368
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,7539211091383512143,2380606721165681595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1956 /prefetch:2
                6⤵
                  PID:2344
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1896,i,7539211091383512143,2380606721165681595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:3
                  6⤵
                    PID:900
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,7539211091383512143,2380606721165681595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2252 /prefetch:8
                    6⤵
                      PID:32
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,7539211091383512143,2380606721165681595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3100 /prefetch:1
                      6⤵
                        PID:4932
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,7539211091383512143,2380606721165681595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:1
                        6⤵
                          PID:3308
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,7539211091383512143,2380606721165681595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:1
                          6⤵
                            PID:2568
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,7539211091383512143,2380606721165681595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:8
                            6⤵
                              PID:3116
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4716,i,7539211091383512143,2380606721165681595,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5076 /prefetch:8
                              6⤵
                                PID:3320
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c Mon0337242833e.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:4952
                          • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon0337242833e.exe
                            Mon0337242833e.exe
                            4⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            PID:3516
                            • C:\Windows\SysWOW64\control.exe
                              "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:3668
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:2400
                                • C:\Windows\system32\RunDll32.exe
                                  C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                  7⤵
                                    PID:4332
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Mon034a40f4c2.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:4832
                            • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon034a40f4c2.exe
                              Mon034a40f4c2.exe
                              4⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:2696
                              • C:\Users\Admin\AppData\Local\Temp\is-R52T6.tmp\Mon034a40f4c2.tmp
                                "C:\Users\Admin\AppData\Local\Temp\is-R52T6.tmp\Mon034a40f4c2.tmp" /SL5="$9003A,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon034a40f4c2.exe"
                                5⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:4968
                                • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon034a40f4c2.exe
                                  "C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon034a40f4c2.exe" /SILENT
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:3412
                                  • C:\Users\Admin\AppData\Local\Temp\is-RHCTS.tmp\Mon034a40f4c2.tmp
                                    "C:\Users\Admin\AppData\Local\Temp\is-RHCTS.tmp\Mon034a40f4c2.tmp" /SL5="$90066,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon034a40f4c2.exe" /SILENT
                                    7⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:5088
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Mon03184374b6827dae2.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:732
                            • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03184374b6827dae2.exe
                              Mon03184374b6827dae2.exe
                              4⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3816
                              • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03184374b6827dae2.exe
                                C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03184374b6827dae2.exe
                                5⤵
                                • Executes dropped EXE
                                PID:1008
                              • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03184374b6827dae2.exe
                                C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03184374b6827dae2.exe
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2424
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Mon0333ecac229eb22.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2568
                            • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon0333ecac229eb22.exe
                              Mon0333ecac229eb22.exe
                              4⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:3732
                              • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon0333ecac229eb22.exe
                                "C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon0333ecac229eb22.exe" -u
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2280
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Mon03ff1e89e18831.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:4780
                            • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03ff1e89e18831.exe
                              Mon03ff1e89e18831.exe
                              4⤵
                              • Executes dropped EXE
                              PID:468
                              • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:1148
                              • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4224
                              • C:\Windows\system32\WerFault.exe
                                C:\Windows\system32\WerFault.exe -u -p 468 -s 920
                                5⤵
                                  PID:3816
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Mon036f89e9eef8271.exe
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:684
                              • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon036f89e9eef8271.exe
                                Mon036f89e9eef8271.exe
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:1292
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Mon0376e7a8f67a.exe
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:5000
                              • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon0376e7a8f67a.exe
                                Mon0376e7a8f67a.exe
                                4⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                PID:3572
                                • C:\Windows\SysWOW64\control.exe
                                  "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1496
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                    6⤵
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:4108
                                    • C:\Windows\system32\RunDll32.exe
                                      C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                      7⤵
                                        PID:2148
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                          8⤵
                                          • Blocklisted process makes network request
                                          • Checks computer location settings
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:2300
                                          • C:\Users\Admin\AppData\Local\Temp\e58a860.exe
                                            "C:\Users\Admin\AppData\Local\Temp\e58a860.exe"
                                            9⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:2400
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 784
                                              10⤵
                                              • Program crash
                                              PID:456
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c Mon0318a4864788e065.exe
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:216
                                • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon0318a4864788e065.exe
                                  Mon0318a4864788e065.exe
                                  4⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Checks SCSI registry key(s)
                                  PID:972
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 356
                                    5⤵
                                    • Program crash
                                    PID:4368
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c Mon03c16839a9b.exe
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4852
                                • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03c16839a9b.exe
                                  Mon03c16839a9b.exe
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3368
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c Mon036bb55bb30d.exe /mixtwo
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:3504
                                • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon036bb55bb30d.exe
                                  Mon036bb55bb30d.exe /mixtwo
                                  4⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4432
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 408
                                    5⤵
                                    • Program crash
                                    PID:2764
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 588
                                3⤵
                                • Program crash
                                PID:4700
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3580 -ip 3580
                            1⤵
                              PID:60
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4432 -ip 4432
                              1⤵
                                PID:752
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 972 -ip 972
                                1⤵
                                  PID:4412
                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                  1⤵
                                    PID:4880
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                    1⤵
                                      PID:3816
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2400 -ip 2400
                                      1⤵
                                        PID:3108

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                        Filesize

                                        649B

                                        MD5

                                        b2964ffff45dd2518080d743d6e43e0f

                                        SHA1

                                        5916954be5f548016aeb06e4511fd014a0bddbe9

                                        SHA256

                                        26cb0c1685047ea65ba10c13a2c7707b42ab602e56f16b4334cfeb5eedfc3a1b

                                        SHA512

                                        ae11b2e97d3a0760f06f29363846c98466e05ca4c1f3064543e57cfe2a295b3417667f00d41bae2b45514a9cb039c8b385c9a4363b4d1a5c61f9a3d50c04557b

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                        Filesize

                                        1KB

                                        MD5

                                        bd63da12e1fb8ff9d70badf9e2d523de

                                        SHA1

                                        906629f10ae75788dfe2b00f66dad8e52407e976

                                        SHA256

                                        963ddf774b1f50f23d7f04aa88c457f8fecd256a3bdc2a73e42013a856341327

                                        SHA512

                                        1cb910465a8d023307e3188fe3c37f3d20c79dc306404428b2286e4c4529083f4608438af767cf4bc9cec6eba62b907cc09ca8e4b11ba2b30101389f9d1ff24c

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                        Filesize

                                        2B

                                        MD5

                                        d751713988987e9331980363e24189ce

                                        SHA1

                                        97d170e1550eee4afc0af065b78cda302a97674c

                                        SHA256

                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                        SHA512

                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        356B

                                        MD5

                                        7c60981a693ea61ed53ad43c5a166971

                                        SHA1

                                        e5315559578704ee94af2cd3d0cc41002ad3a8cb

                                        SHA256

                                        ab1714f613051a8f668c80a3db4b023b4c17f7503943fe2f2e17e29a88aff27b

                                        SHA512

                                        2d977fed3117c4701d6652cc86e71b51186443e603adacdda421c3d3f584cb8cf8f1f71882dc3696e7b919874b4cbdbae31863c514d310284a6b13946015647e

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        9KB

                                        MD5

                                        3fb284ebd29e241731962516f4c55dd8

                                        SHA1

                                        f382781d57145f4f4e37a0257a9edbf56f232baa

                                        SHA256

                                        db0872efe2587d51663db5b7ca7bcda5a9f8ac47d145961668cd63337cf523c0

                                        SHA512

                                        0f29e31c3179fe3a3628bfe8d4d7626d0eed1626b5453311f52bd04641c1087a3cb1d23754bcd0a6951f9b9ba75153e54283881ba2d06228e29b147183208974

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        9KB

                                        MD5

                                        c91672924aad646d0f252e2d3d6d6332

                                        SHA1

                                        ab08a1a0b7c4846689581472915dcc9142488043

                                        SHA256

                                        bd5a4f3b573469174a4785478a0e2bcedaecd433c96c3f65aa4f9f14e4294bd0

                                        SHA512

                                        c546fa95acaadc780bf73dd13c148b244dae457d491e73b39aa33bd0cac9a6f7d3b8786a9b10cfac8ac24f6aead8dc956bff6b10b32ae96c0f666e5bf12c1c3b

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        9KB

                                        MD5

                                        a0b848fd8e973c52f2372f9e3e6cfff5

                                        SHA1

                                        3e5c032e9d78f72371bec66a8890384b6289c9d1

                                        SHA256

                                        302882b245da1c3401e67eabc0ebd616a90956fcafb226a06fa9d90201c193fe

                                        SHA512

                                        0434cc4a0aeb94e4cdc116731e89524437aaca2c4d3515a6dee1fc07b779e0c9d9af8eb78fd0a1f47d5bb0becc87994f6502b4998b5d6b726a15947ddc627653

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        9KB

                                        MD5

                                        837def43dc4154bb259617ab7f7c437b

                                        SHA1

                                        7d37c5a190863404bc85b77fa8ff4f55c1793950

                                        SHA256

                                        466bf67da427137ff1e8e1afeed35336adb0085eafbed188d28c6af9c65f66a7

                                        SHA512

                                        f613ed0435a7f1f851c1bde85b1a3ff71f6dfd0e5ba77c21583c3ed8f45bed67a7a4d3e2be03ae5334f8bb29ed480b719db84e9787d3602a89933f1be63d4bc8

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                        Filesize

                                        17KB

                                        MD5

                                        323a8aecb373992550d8f1fcadb6ce9d

                                        SHA1

                                        075e3542af7dbcb0df5d1ff1c9a21298f1348124

                                        SHA256

                                        decf401a1aaf084846d7e352992ae4440a4d98bce047d6acada838b15ff8d103

                                        SHA512

                                        34581cb860a13b40514cf265af4f03c2c0d751ed6486b473ad22a0d770f1442211b4a675b50e0eb154c95da3d5440fd11c10689d04eef19ece6ef88cf526db1f

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                        Filesize

                                        17KB

                                        MD5

                                        a6d5c6c2fef6d01d9479633869cc951d

                                        SHA1

                                        587442042b9d9aff9a74ab4bbc2a425381c15b43

                                        SHA256

                                        07215ec20b128706214bdb94e8742158c0f095d47a104e14a1b3199182ecebfa

                                        SHA512

                                        a498a1c3269cbd2895034b95d6134ef2e99fb84c9b2743394ddfc4c099f921847c1bb034fef4c08a45cd482f26c84cf6a4c07f22b59cfea4c96c4b2983bf4a41

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        116KB

                                        MD5

                                        1b400e1b1f04f73365159f1cf58447b0

                                        SHA1

                                        4c29ecc091eec03d4cde1345e9771fcb18fc0bf2

                                        SHA256

                                        425f4ebc406d0d28de3e6a7e8962ff4a44ae8f84a1f1a3ff6bd686186621cf9f

                                        SHA512

                                        e2b783ba4b37f57d2ad1a24b2933e80b521beb7041fc4625aeebd2f77dcebf24fc21fa0533f13b81d51c24d465dced19d439375688e4c56e8f419d05a823def8

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        234KB

                                        MD5

                                        0dd1a32cc766ba1625bcb4da19415c20

                                        SHA1

                                        aee50fdd58242d4e693d983e6906ccf5c1492ddf

                                        SHA256

                                        4ed68ff620cbc1419c4f9194d01fcebdde6e937e48f96e045cc62066ce127a03

                                        SHA512

                                        698b14ea39d2b237a3cde725569e80f46ffd4e8aeea75cbe165256f7aedbb2c8ede0a75f81d49379a924c22ccdef1f1076f24e8e5c139074cc1fc429a622d108

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\e9d9f70f-bcf7-4880-9943-760b122083e9.tmp

                                        Filesize

                                        234KB

                                        MD5

                                        627c4d88249130ba9a2191bc07e3404f

                                        SHA1

                                        d6daa5c9f046014a6e32213fb48f2daa97ec7e08

                                        SHA256

                                        85ad5b7ff5de308771ef9d682b80723dc1e516ec2c4c6b58a9b04392d33effa7

                                        SHA512

                                        6459f21020e378a0a510c9453ec5e895fbaed4be186f77905038852b348c60ee554cb4cb8ad2c4899d2ef9f9355abd7efb2c14ef9c0753835436ee230bec7c73

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Mon03184374b6827dae2.exe.log

                                        Filesize

                                        700B

                                        MD5

                                        e5352797047ad2c91b83e933b24fbc4f

                                        SHA1

                                        9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772

                                        SHA256

                                        b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c

                                        SHA512

                                        dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                        Filesize

                                        2KB

                                        MD5

                                        968cb9309758126772781b83adb8a28f

                                        SHA1

                                        8da30e71accf186b2ba11da1797cf67f8f78b47c

                                        SHA256

                                        92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                        SHA512

                                        4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                        Filesize

                                        16KB

                                        MD5

                                        b0fec07507d2192a9f0613dcf285ecf6

                                        SHA1

                                        ddad506e51e3a2eee70917241d4f59878999c068

                                        SHA256

                                        26de84db525e6238b4bc30324ee69ff5f4ad928ddf4af9b9ddc59172f045ca96

                                        SHA512

                                        07fdcb38cc70b71c4a7232c5ed20a3e78d56e15f7f9e99af9d79328e7ed33dd02a25d3e0f69db481af32afe9674aef8e5bb2748ce5bb3fbafaac5cd6ed3569d3

                                      • C:\Users\Admin\AppData\Local\Temp\11111.exe

                                        Filesize

                                        311KB

                                        MD5

                                        cc0d6b6813f92dbf5be3ecacf44d662a

                                        SHA1

                                        b968c57a14ddada4128356f6e39fb66c6d864d3f

                                        SHA256

                                        0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                                        SHA512

                                        4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                                      • C:\Users\Admin\AppData\Local\Temp\11111.exe

                                        Filesize

                                        391KB

                                        MD5

                                        7165e9d7456520d1f1644aa26da7c423

                                        SHA1

                                        177f9116229a021e24f80c4059999c4c52f9e830

                                        SHA256

                                        40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67

                                        SHA512

                                        fe80996a7f5c64815c19db1fa582581aa1934ea8d1050e686b4f65bcdd000df1decdf711e0e4b1de8a2aa4fcb1ac95cebb0316017c42e80d8386bd3400fcaecb

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03184374b6827dae2.exe

                                        Filesize

                                        526KB

                                        MD5

                                        7df1d7d115da507238cf409fa1bd0b91

                                        SHA1

                                        a133c62a14f3871c552a0bcad87a291d5744c2cf

                                        SHA256

                                        2bed8e9c8a557e04ab5f5c3b2a4a26133f62993277dbf0fa0ab574eabb4eddd0

                                        SHA512

                                        2ab249240a4c76d65a225787f2207f38a08cd3e2756bf23c2446343a583fb32a51b5e5674c3af2100a55e53ab49167c462061f251d19e3f89c23526d752c688a

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon0318a4864788e065.exe

                                        Filesize

                                        327KB

                                        MD5

                                        47e1245ae15e44e2df28280d95ad2741

                                        SHA1

                                        cb5abc70156154368ff10271fa1c1e80dab6d417

                                        SHA256

                                        c614c4dfbc4fd75a9ccd3ed8b14440de34a7c1945ccf865a414e2e3111162696

                                        SHA512

                                        032df7df40c06266c25a25a2efd945bfd7591dc442b3f4183163491f432f1be8ce2b0554067c3fe02361aeb962bd53d20878db3bec495a52c13787b31dceadeb

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon0333ecac229eb22.exe

                                        Filesize

                                        124KB

                                        MD5

                                        b6f7de71dcc4573e5e5588d6876311fc

                                        SHA1

                                        645b41e6ea119615db745dd8e776672a4ba59c57

                                        SHA256

                                        73437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad

                                        SHA512

                                        ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon0337242833e.exe

                                        Filesize

                                        1.9MB

                                        MD5

                                        d1ec05df172b32843f1564bc34feef68

                                        SHA1

                                        29ae8b1a96f294b2f420c7710c81740e79eb2b91

                                        SHA256

                                        e7bfb6e1cba02dd07c20e937a535193f25e87194be8fa6f949a967dc7bd919cf

                                        SHA512

                                        500e55b9976837acf11c97021361f7a57c7425f25e95aab20f5d83fe5c8d582de7bcae0b500cbaf85da52fc739aaaef7a3bd5f8d8b500820b83a0bbd286d26fb

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon034a40f4c2.exe

                                        Filesize

                                        1.7MB

                                        MD5

                                        99918fe3d5011f5e084492e0d9701779

                                        SHA1

                                        55f7a03c6380bb9f51793be0774681b473e07c9f

                                        SHA256

                                        558a67043fbcd0bc37d34c99ff16f66b259b24b44811516ceff678964ec655c4

                                        SHA512

                                        682f1c6c648319c974e608defa41b714d0e8c3670d3f5e669b7227aaf5400285f9f0c6c5c82c50518031d8a93a3cfd591031651068d5a458a6606f2bf51d3e12

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon036bb55bb30d.exe

                                        Filesize

                                        1.1MB

                                        MD5

                                        aa75aa3f07c593b1cd7441f7d8723e14

                                        SHA1

                                        f8e9190ccb6b36474c63ed65a74629ad490f2620

                                        SHA256

                                        af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1

                                        SHA512

                                        b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon036f89e9eef8271.exe

                                        Filesize

                                        759KB

                                        MD5

                                        f85794c2bf341a1efe78cdad0b1b4dc5

                                        SHA1

                                        d7ff2be2dafed282b5eda883ee7d02a4eca75194

                                        SHA256

                                        6455d5f4eae530ace507b2ac338777b408e99094acf96bbef7603d7af641b833

                                        SHA512

                                        91f98cff29225a025114013a9ce7423a3e5646725a927606f66577724a691b367004ca8d36ce51f129243a6a87003abd8dd09fa7b195e8ecf70fbc73305f7790

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon0376e7a8f67a.exe

                                        Filesize

                                        1.9MB

                                        MD5

                                        a3ba569405d0fa3f577e9c83b6c303af

                                        SHA1

                                        2ba0d6724aa30dc474ee00a06573e8652a117eac

                                        SHA256

                                        2799a1a7d1a6d1e1dc2746bea858c4052cab03833b069beac261a9f4ad56be90

                                        SHA512

                                        f23907f89db9e9bc6ce80faf1577a461de9ddd23009069a3ab4ab8bc18f610a6c5b44bac5469145fdc61ba130755c02baf83783d7a31d0de747d1b11f260ad0d

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03c16839a9b.exe

                                        Filesize

                                        316KB

                                        MD5

                                        8427ae0ce0ded0794b9e0b3dd422702e

                                        SHA1

                                        6e5350072840eb80a09e2c28ce22c2bca8e2aab1

                                        SHA256

                                        8ca5df6f0a4bbc6ae6a0f56b5b2c72e253c4cc72c40919d8984039de8f45e41a

                                        SHA512

                                        90cb046d28eb7e956f99e024a89c05a14cae99580122d99fe49872b36c8f8de95331dd4fee60458b118f96ab40baf770c3f07dbcef2b4b6530832fcb00feac78

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03f186a0d10.exe

                                        Filesize

                                        1.4MB

                                        MD5

                                        28a0b3751b521af221baa3a76f32c8c1

                                        SHA1

                                        f71aaa12ac600549120b062cbbd852b1a1807c43

                                        SHA256

                                        710ceb98e12443d28a9fd280b453eade11bc3483f6280dc224eb48ed327028ca

                                        SHA512

                                        a3773694f59a8f4c7cd06f7dc97c41bf943cf2e9b6283027964890f0122e26c9822e6b91b3ac23eacefa6954b0b983e7dd9226bfb37682f1645f8c85b24fda4f

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\Mon03ff1e89e18831.exe

                                        Filesize

                                        1.9MB

                                        MD5

                                        74e88352f861cb12890a36f1e475b4af

                                        SHA1

                                        7dd54ab35260f277b8dcafb556dd66f4667c22d1

                                        SHA256

                                        64578ffca840ebc3f791f1faa21252941d9fd384622d54a28226659ad05650a3

                                        SHA512

                                        18a6911b0d86088d265f49471c52d901a39d1549f9ac36681946a1b91fdb2f71f162ddf4b4659be061302fae6d616852d44c9a151f66eb53bbcc2fde6e7b9463

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\libcurl.dll

                                        Filesize

                                        218KB

                                        MD5

                                        d09be1f47fd6b827c81a4812b4f7296f

                                        SHA1

                                        028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                                        SHA256

                                        0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                                        SHA512

                                        857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\libcurlpp.dll

                                        Filesize

                                        54KB

                                        MD5

                                        e6e578373c2e416289a8da55f1dc5e8e

                                        SHA1

                                        b601a229b66ec3d19c2369b36216c6f6eb1c063e

                                        SHA256

                                        43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                                        SHA512

                                        9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\libgcc_s_dw2-1.dll

                                        Filesize

                                        113KB

                                        MD5

                                        9aec524b616618b0d3d00b27b6f51da1

                                        SHA1

                                        64264300801a353db324d11738ffed876550e1d3

                                        SHA256

                                        59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                                        SHA512

                                        0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\libstdc++-6.dll

                                        Filesize

                                        647KB

                                        MD5

                                        5e279950775baae5fea04d2cc4526bcc

                                        SHA1

                                        8aef1e10031c3629512c43dd8b0b5d9060878453

                                        SHA256

                                        97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                                        SHA512

                                        666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\libwinpthread-1.dll

                                        Filesize

                                        69KB

                                        MD5

                                        1e0d62c34ff2e649ebc5c372065732ee

                                        SHA1

                                        fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                                        SHA256

                                        509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                                        SHA512

                                        3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                                      • C:\Users\Admin\AppData\Local\Temp\7zS8B32B687\setup_install.exe

                                        Filesize

                                        2.1MB

                                        MD5

                                        cd66b43b6558d0e17a0e92fd7ac42787

                                        SHA1

                                        90aedefa4b7082676d02568eb31012e40d1d6655

                                        SHA256

                                        ea8907747931024f386f148247b5cf0c1fff53df0d61ab6a1d85c84809511aab

                                        SHA512

                                        5f5848a056eaab118bf2a80fdf5fc0b6262654c9564a955f9e956ed89c102c610346e1d8de75a4b1840166062fe3299b70c049c8f6d25109cc073a91288a0b8b

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l1wxooex.t0z.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\AppData\Local\Temp\e58a860.exe

                                        Filesize

                                        11KB

                                        MD5

                                        620bda3df817bff8deb38758d1dc668c

                                        SHA1

                                        9933523941851b42047f2b7a1324eb8daa8fb1ff

                                        SHA256

                                        b74d7ff45768a1ee6f267e895de3e46cca505edf205563ef3f7db827f38363b3

                                        SHA512

                                        bc9e932860f63090bab251057bc1fd6875c410c2358321eaa74fccc117561b91e4ce6b24d5e7bb13dc44732ae151b7c33fe201acbb5af689d7f2d248dfb8c568

                                      • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

                                        Filesize

                                        1KB

                                        MD5

                                        2e9d08d52880309cd9dcf011cf3b21d1

                                        SHA1

                                        8fda4720b491d637d61b8aefab957092ffb24c28

                                        SHA256

                                        6750b9f23a8c66f712ca83cdafd75da821563dee1afc813bc9b53c9e4b3f9b26

                                        SHA512

                                        94abf3aeb44d704d9af4946b0d1b270e396b6693e341f43f1bd27facec01204aec5671ec55c3e320d05606b9ed6d0518d32a9e4a30dfe5025ac0f0e30b8177b0

                                      • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

                                        Filesize

                                        31B

                                        MD5

                                        b7161c0845a64ff6d7345b67ff97f3b0

                                        SHA1

                                        d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                                        SHA256

                                        fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                                        SHA512

                                        98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                                      • C:\Users\Admin\AppData\Local\Temp\is-1JPF1.tmp\idp.dll

                                        Filesize

                                        216KB

                                        MD5

                                        b37377d34c8262a90ff95a9a92b65ed8

                                        SHA1

                                        faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                                        SHA256

                                        e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                                        SHA512

                                        69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                                      • C:\Users\Admin\AppData\Local\Temp\is-ECUAN.tmp\_isetup\_shfoldr.dll

                                        Filesize

                                        22KB

                                        MD5

                                        92dc6ef532fbb4a5c3201469a5b5eb63

                                        SHA1

                                        3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                        SHA256

                                        9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                        SHA512

                                        9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                      • C:\Users\Admin\AppData\Local\Temp\is-R52T6.tmp\Mon034a40f4c2.tmp

                                        Filesize

                                        691KB

                                        MD5

                                        9303156631ee2436db23827e27337be4

                                        SHA1

                                        018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                                        SHA256

                                        bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                                        SHA512

                                        9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                                      • memory/696-76-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/696-211-0x000000006EC10000-0x000000006EC5C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/696-264-0x0000000007460000-0x000000000747A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/696-266-0x0000000007450000-0x0000000007458000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/696-263-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/696-97-0x0000000005720000-0x0000000005786000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/696-86-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/696-260-0x0000000007360000-0x000000000736E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/696-284-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/696-87-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/696-233-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/696-221-0x0000000006DC0000-0x0000000006DDE000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/696-210-0x0000000006D80000-0x0000000006DB2000-memory.dmp

                                        Filesize

                                        200KB

                                      • memory/696-90-0x0000000005680000-0x00000000056A2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/696-98-0x0000000005790000-0x00000000057F6000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/696-124-0x0000000005900000-0x0000000005C54000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/972-186-0x0000000000400000-0x00000000004D3000-memory.dmp

                                        Filesize

                                        844KB

                                      • memory/1148-192-0x0000000000400000-0x0000000000455000-memory.dmp

                                        Filesize

                                        340KB

                                      • memory/1292-262-0x0000000000400000-0x000000000053F000-memory.dmp

                                        Filesize

                                        1.2MB

                                      • memory/2300-375-0x000000002E650000-0x000000002E6E0000-memory.dmp

                                        Filesize

                                        576KB

                                      • memory/2300-327-0x00000000023A0000-0x00000000033A0000-memory.dmp

                                        Filesize

                                        16.0MB

                                      • memory/2300-386-0x00000000000A0000-0x00000000000A5000-memory.dmp

                                        Filesize

                                        20KB

                                      • memory/2300-385-0x0000000000090000-0x0000000000093000-memory.dmp

                                        Filesize

                                        12KB

                                      • memory/2300-371-0x000000002E5B0000-0x000000002E646000-memory.dmp

                                        Filesize

                                        600KB

                                      • memory/2300-369-0x000000002D380000-0x000000002D41C000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/2300-358-0x000000002D380000-0x000000002D41C000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/2300-360-0x000000002D380000-0x000000002D41C000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/2300-376-0x00000000023A0000-0x00000000033A0000-memory.dmp

                                        Filesize

                                        16.0MB

                                      • memory/2300-370-0x000000002D420000-0x000000002E5A7000-memory.dmp

                                        Filesize

                                        17.5MB

                                      • memory/2300-372-0x000000002E650000-0x000000002E6E0000-memory.dmp

                                        Filesize

                                        576KB

                                      • memory/2300-356-0x000000002D2C0000-0x000000002D371000-memory.dmp

                                        Filesize

                                        708KB

                                      • memory/2300-357-0x000000002D380000-0x000000002D41C000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/2400-447-0x0000000000560000-0x0000000000568000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2424-239-0x0000000000400000-0x0000000000420000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2424-247-0x0000000005400000-0x000000000550A000-memory.dmp

                                        Filesize

                                        1.0MB

                                      • memory/2424-243-0x00000000052D0000-0x00000000052E2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/2424-242-0x00000000057A0000-0x0000000005DB8000-memory.dmp

                                        Filesize

                                        6.1MB

                                      • memory/2424-249-0x0000000005330000-0x000000000536C000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/2696-93-0x0000000000400000-0x0000000000414000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/2696-158-0x0000000000400000-0x0000000000414000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/3276-70-0x0000000004E30000-0x0000000004E66000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/3276-255-0x0000000007970000-0x0000000007A06000-memory.dmp

                                        Filesize

                                        600KB

                                      • memory/3276-250-0x0000000007780000-0x000000000778A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/3276-241-0x0000000007700000-0x000000000771A000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/3276-240-0x0000000007D40000-0x00000000083BA000-memory.dmp

                                        Filesize

                                        6.5MB

                                      • memory/3276-234-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/3276-69-0x0000000073E3E000-0x0000000073E3F000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3276-85-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/3276-254-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/3276-222-0x000000006EC10000-0x000000006EC5C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/3276-253-0x0000000073E3E000-0x0000000073E3F000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3276-256-0x0000000007900000-0x0000000007911000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/3276-83-0x00000000055A0000-0x0000000005BC8000-memory.dmp

                                        Filesize

                                        6.2MB

                                      • memory/3276-261-0x0000000007940000-0x0000000007954000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/3276-288-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/3276-178-0x0000000006750000-0x000000000679C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/3276-171-0x0000000005140000-0x000000000515E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/3276-232-0x00000000075C0000-0x0000000007663000-memory.dmp

                                        Filesize

                                        652KB

                                      • memory/3276-84-0x0000000073E30000-0x00000000745E0000-memory.dmp

                                        Filesize

                                        7.7MB

                                      • memory/3368-170-0x0000024255DF0000-0x0000024255DF6000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/3368-153-0x0000024254110000-0x0000024254168000-memory.dmp

                                        Filesize

                                        352KB

                                      • memory/3368-168-0x0000024255E10000-0x0000024255E56000-memory.dmp

                                        Filesize

                                        280KB

                                      • memory/3368-154-0x0000024255DE0000-0x0000024255DE6000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/3412-303-0x0000000000400000-0x0000000000414000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/3412-148-0x0000000000400000-0x0000000000414000-memory.dmp

                                        Filesize

                                        80KB

                                      • memory/3580-62-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                        Filesize

                                        152KB

                                      • memory/3580-181-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/3580-65-0x0000000000760000-0x00000000007EF000-memory.dmp

                                        Filesize

                                        572KB

                                      • memory/3580-68-0x0000000064940000-0x0000000064959000-memory.dmp

                                        Filesize

                                        100KB

                                      • memory/3580-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                        Filesize

                                        572KB

                                      • memory/3580-55-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                        Filesize

                                        572KB

                                      • memory/3580-56-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                        Filesize

                                        572KB

                                      • memory/3580-67-0x0000000064941000-0x000000006494F000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/3580-182-0x0000000064940000-0x0000000064959000-memory.dmp

                                        Filesize

                                        100KB

                                      • memory/3580-57-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/3580-180-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                        Filesize

                                        572KB

                                      • memory/3580-179-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                        Filesize

                                        152KB

                                      • memory/3580-176-0x000000006EB40000-0x000000006EB63000-memory.dmp

                                        Filesize

                                        140KB

                                      • memory/3580-172-0x0000000000400000-0x000000000051C000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/3580-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/3580-60-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/3580-61-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                        Filesize

                                        152KB

                                      • memory/3580-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/3580-63-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                        Filesize

                                        152KB

                                      • memory/3580-64-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                        Filesize

                                        572KB

                                      • memory/3580-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/3816-95-0x0000000000C10000-0x0000000000C9A000-memory.dmp

                                        Filesize

                                        552KB

                                      • memory/3816-127-0x00000000054B0000-0x00000000054CE000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/3816-134-0x0000000005B70000-0x0000000006114000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/3816-102-0x0000000005510000-0x0000000005586000-memory.dmp

                                        Filesize

                                        472KB

                                      • memory/4108-323-0x000000002ED20000-0x000000002EDB6000-memory.dmp

                                        Filesize

                                        600KB

                                      • memory/4108-294-0x000000002DA30000-0x000000002DAE1000-memory.dmp

                                        Filesize

                                        708KB

                                      • memory/4108-321-0x000000002DAF0000-0x000000002DB8C000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/4108-302-0x000000002DAF0000-0x000000002DB8C000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/4108-314-0x0000000002C20000-0x0000000003C20000-memory.dmp

                                        Filesize

                                        16.0MB

                                      • memory/4108-300-0x000000002DAF0000-0x000000002DB8C000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/4108-248-0x0000000002C20000-0x0000000003C20000-memory.dmp

                                        Filesize

                                        16.0MB

                                      • memory/4108-322-0x000000002DB90000-0x000000002ED17000-memory.dmp

                                        Filesize

                                        17.5MB

                                      • memory/4108-324-0x000000002EDC0000-0x000000002EE50000-memory.dmp

                                        Filesize

                                        576KB

                                      • memory/4108-295-0x000000002DAF0000-0x000000002DB8C000-memory.dmp

                                        Filesize

                                        624KB

                                      • memory/4224-268-0x0000000000400000-0x000000000047C000-memory.dmp

                                        Filesize

                                        496KB

                                      • memory/4432-126-0x0000000000400000-0x00000000004DE000-memory.dmp

                                        Filesize

                                        888KB

                                      • memory/4432-185-0x0000000000400000-0x00000000004DE000-memory.dmp

                                        Filesize

                                        888KB

                                      • memory/4968-151-0x0000000000400000-0x00000000004BD000-memory.dmp

                                        Filesize

                                        756KB

                                      • memory/5088-309-0x0000000000400000-0x00000000004BD000-memory.dmp

                                        Filesize

                                        756KB