Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2024, 16:19

General

  • Target

    e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe

  • Size

    7.5MB

  • MD5

    7e95861bfb9a3eae5a1c0365297ec490

  • SHA1

    458f1b294b7a1ebc5a29030fd066d7124970b251

  • SHA256

    e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5

  • SHA512

    78066b7275328d403e99def49700d34635ad68c190baacf6652509e9403d53035e89f213ceff72ca76fa29673ccb9894ac5c321a18e0508060718432b447573a

  • SSDEEP

    196608:xqwVbwdkjjHPyoXYqMkV3xH6OP5hHnYtmj643Rd:xtBwdG7PDIqtVBHkS

Malware Config

Extracted

Family

socelars

C2

http://www.chosenncrowned.com/

Extracted

Family

nullmixer

C2

http://hornygl.xyz/

Extracted

Family

redline

Botnet

media25pqs

C2

65.108.69.168:13293

Attributes
  • auth_value

    e792d0d7a03fceb57d0e07caa26bb34f

Extracted

Family

vidar

Version

49.2

Botnet

915

C2

https://mstdn.social/@kipriauk9

https://qoto.org/@kipriauk8

Attributes
  • profile_id

    915

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Fabookie family
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • Nullmixer family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars family
  • Socelars payload 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Detected Nirsoft tools 5 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Vidar Stealer 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops Chrome extension 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe
    "C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2228
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4064
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4900
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4580
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Mon03f186a0d10.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:216
        • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe
          Mon03f186a0d10.exe
          4⤵
          • Executes dropped EXE
          • Drops Chrome extension
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4512
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c taskkill /f /im chrome.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1396
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /f /im chrome.exe
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1892
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe"
            5⤵
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:464
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd1496cc40,0x7ffd1496cc4c,0x7ffd1496cc58
              6⤵
                PID:1004
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:2
                6⤵
                  PID:5048
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:3
                  6⤵
                    PID:3676
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2616 /prefetch:8
                    6⤵
                      PID:4940
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3068,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3092 /prefetch:1
                      6⤵
                        PID:2200
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:1
                        6⤵
                          PID:3136
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4488,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:1
                          6⤵
                            PID:2492
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3640,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4652 /prefetch:8
                            6⤵
                              PID:3400
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4504,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4692 /prefetch:8
                              6⤵
                                PID:2832
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c Mon0337242833e.exe
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:1876
                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe
                            Mon0337242833e.exe
                            4⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            PID:1232
                            • C:\Windows\SysWOW64\control.exe
                              "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:4856
                              • C:\Windows\SysWOW64\rundll32.exe
                                "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                6⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:1800
                                • C:\Windows\system32\RunDll32.exe
                                  C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                  7⤵
                                    PID:4972
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                      8⤵
                                      • Blocklisted process makes network request
                                      • Checks computer location settings
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:4448
                                      • C:\Users\Admin\AppData\Local\Temp\e587b17.exe
                                        "C:\Users\Admin\AppData\Local\Temp\e587b17.exe"
                                        9⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:2972
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 788
                                          10⤵
                                          • Program crash
                                          PID:3972
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Mon034a40f4c2.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:1608
                            • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe
                              Mon034a40f4c2.exe
                              4⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:1332
                              • C:\Users\Admin\AppData\Local\Temp\is-5S4VA.tmp\Mon034a40f4c2.tmp
                                "C:\Users\Admin\AppData\Local\Temp\is-5S4VA.tmp\Mon034a40f4c2.tmp" /SL5="$40178,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe"
                                5⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:644
                                • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe
                                  "C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe" /SILENT
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4040
                                  • C:\Users\Admin\AppData\Local\Temp\is-MO5BV.tmp\Mon034a40f4c2.tmp
                                    "C:\Users\Admin\AppData\Local\Temp\is-MO5BV.tmp\Mon034a40f4c2.tmp" /SL5="$B0142,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe" /SILENT
                                    7⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:3256
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Mon03184374b6827dae2.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:2148
                            • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe
                              Mon03184374b6827dae2.exe
                              4⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4368
                              • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe
                                C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:1040
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Mon0333ecac229eb22.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:4532
                            • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe
                              Mon0333ecac229eb22.exe
                              4⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:2700
                              • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe
                                "C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe" -u
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:4412
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Mon03ff1e89e18831.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:3192
                            • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03ff1e89e18831.exe
                              Mon03ff1e89e18831.exe
                              4⤵
                              • Executes dropped EXE
                              PID:2188
                              • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3900
                              • C:\Users\Admin\AppData\Local\Temp\11111.exe
                                C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                5⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4928
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Mon036f89e9eef8271.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:440
                            • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036f89e9eef8271.exe
                              Mon036f89e9eef8271.exe
                              4⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:4376
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c Mon0376e7a8f67a.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4472
                            • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0376e7a8f67a.exe
                              Mon0376e7a8f67a.exe
                              4⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              PID:772
                              • C:\Windows\SysWOW64\control.exe
                                "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                5⤵
                                • System Location Discovery: System Language Discovery
                                PID:4356
                                • C:\Windows\SysWOW64\rundll32.exe
                                  "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2732
                                  • C:\Windows\system32\RunDll32.exe
                                    C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",
                                    7⤵
                                      PID:4948
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Mon0318a4864788e065.exe
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:1336
                              • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0318a4864788e065.exe
                                Mon0318a4864788e065.exe
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Checks SCSI registry key(s)
                                PID:4696
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 236
                                  5⤵
                                  • Program crash
                                  PID:2748
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Mon03c16839a9b.exe
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:412
                              • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03c16839a9b.exe
                                Mon03c16839a9b.exe
                                4⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2052
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Mon036bb55bb30d.exe /mixtwo
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:464
                              • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036bb55bb30d.exe
                                Mon036bb55bb30d.exe /mixtwo
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:3948
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 408
                                  5⤵
                                  • Program crash
                                  PID:3708
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 588
                              3⤵
                              • Program crash
                              PID:2004
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4872 -ip 4872
                          1⤵
                            PID:1476
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3948 -ip 3948
                            1⤵
                              PID:3424
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4696 -ip 4696
                              1⤵
                                PID:3372
                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                1⤵
                                  PID:3840
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                  1⤵
                                    PID:3032
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2972 -ip 2972
                                    1⤵
                                      PID:2472

                                    Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                            Filesize

                                            649B

                                            MD5

                                            28fdc09a25e028344f0ed79b5224a406

                                            SHA1

                                            905bfae40d373f830dbbb9a0365e7640d2e671eb

                                            SHA256

                                            dd7e0aacaa5b2f1decece770a32dcb23b75165a60d18109208365525947f9e67

                                            SHA512

                                            8ac108a77102e506c3073228548cfadbc4b6fc04448a1366bfb9e615640679665d00f10856537f3ae377e9763091daf56690dd0d7e36f13201ee90db4c6beba0

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                            Filesize

                                            1KB

                                            MD5

                                            55dc23faaec48cd9be06639a998eb16b

                                            SHA1

                                            5d9dfd7b54bace7e908779e886863dc6f8b6e48d

                                            SHA256

                                            998d6db5f27017ff665d374079d78d55d366c9fd1121020e3f6b92c5a622b943

                                            SHA512

                                            9cc5587efd5d0144df07188c309bd175c6a3e156f9ea78265bbaa2f2aab7b7f11b84105f0337dd6a7856d0b85e2bce690fa29669b67c80ef07e027ab86ebf6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            356B

                                            MD5

                                            a62ab02fc58c8b6280c0ecb6d922e96e

                                            SHA1

                                            f62a2cafc8ecd32d4c467d33ac1d41a4d040eae1

                                            SHA256

                                            b1f8ba3db92dd1371a36cbb0bec4da34525839ece3e6648df709abe9774b0a57

                                            SHA512

                                            f87117b61a63fafb0f23d7d80569d9f9e0842fb81e2268895d42235a3cd0a85736134b527e2662f5333dde47cda129933a2a2000731cfe85f879b1236f59cc03

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\c8673b9f-0968-409c-a10a-6a6005bf1951.tmp

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            718c87d47272dbbf28fd3d3a0a6f434f

                                            SHA1

                                            343925f5a531de8f0556b15be381c4c7890a33b4

                                            SHA256

                                            bb675bbd2e499d951798a97aa0700b429f19a137f7a7a5a6ccfbec9623786586

                                            SHA512

                                            2569399a88bbf28b659fc37cadad5a9257bada0d293ddbb6dea8447ed8174523b96e472784feb88f4e660fb6b41946572814c13afa9a4c23c098018a82d51bbf

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            5b0c408ec51568141f1b0247a2c091d7

                                            SHA1

                                            6ffccf76f49009d3399e6e797265904abaa83fc5

                                            SHA256

                                            dd6415003de95a3674024245ffe3fa32085c6d1e6bf15a8aabab315447a2a0c9

                                            SHA512

                                            8f694ee1a388e777c5af4638845d0a6db840ae62ae32599b1517836c22d5e95bff2e300bfa6c4fc85533e0a49dc4a1ab2e802be66a3efb725001a92290d66800

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            e714570160bd373b43d622acefc0323f

                                            SHA1

                                            806edf8e728510a963a3cfa4daa8bb7eef8a6449

                                            SHA256

                                            8ced255291513365b09c712911e37744f00ae6038afbfc96f30cbc3aff4dfdf8

                                            SHA512

                                            afe22056e5b9bdca6c39983eb827895505a34da9b7f8d1e754d38ae3507fb745818a2816f562e510784be3d29a2f22c4c7feab439a3180efd36f54703064ff24

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                            Filesize

                                            17KB

                                            MD5

                                            09ed7abe7f53f088a521e8d81f6c3dc6

                                            SHA1

                                            d8b0fceab80957b44e24fb0f11dec0dbf8a944db

                                            SHA256

                                            0452f6ded757cc1b7cba91b9ef98912d44c33d8b3613c6901f997b4bdbf47b6d

                                            SHA512

                                            1c9ebefcc5512d1737c736a68c24cb9888018c65e297121fe175ccdc117999545742170ce04ddfa6812136636eb8c5c7b53b329a7719f6c406617c67770d3c7d

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                            Filesize

                                            17KB

                                            MD5

                                            93d5ae52f68158a26e78d72afa1f5dc3

                                            SHA1

                                            417bc10878b1e5c1b66e8d1bf98d8020c2587599

                                            SHA256

                                            83ad800949097df24bc457694a9a1c31405ed287e9401330f2a2d08221bde129

                                            SHA512

                                            46f146a2d3948e1d243a864ee944854ea5794384619eccac735dc9ab3a6312ab8c075ce6cc161e617ae0548b969feafe6995d00561b1d54770585da0a0f20855

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            116KB

                                            MD5

                                            2e548b07c1505ebdbd4b65941d82363b

                                            SHA1

                                            a224ed186fbca4b307c754719dea6a10cea15130

                                            SHA256

                                            065d7da8c26b65895ad2c5e3aa86ea657e8de218295e179ed1aa98bc530ee1c6

                                            SHA512

                                            8d50bb6b86220737284feefb6167d234563a8d15d054bcada004f25841d84751c5f51c61e3392a260eef7697008aa53ebd993b2b69abbd2914c9b3dcb5857270

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            234KB

                                            MD5

                                            4a1f0148d40a32a70ae0c75497fe2ce4

                                            SHA1

                                            28454abb0cc3bd1942d776cd37dda5f638acaab3

                                            SHA256

                                            6d32f114f6ef96fb5cdc8b0d2cb9f3c5966f87e759a1d0906de45117fc0b25aa

                                            SHA512

                                            42c4bc412f873c75792097862b6ee42b1a6c61ab113992ace47d3ff3d40f5bd50eb0e2fcf956cb6bcea89f09307858c035aee7d1921fe6c157f0f1ed42b1de30

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Mon03184374b6827dae2.exe.log

                                            Filesize

                                            700B

                                            MD5

                                            e5352797047ad2c91b83e933b24fbc4f

                                            SHA1

                                            9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772

                                            SHA256

                                            b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c

                                            SHA512

                                            dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            3d086a433708053f9bf9523e1d87a4e8

                                            SHA1

                                            b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                                            SHA256

                                            6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                                            SHA512

                                            931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                            Filesize

                                            16KB

                                            MD5

                                            3cd06df8626eaecac2319f8dc4de18b5

                                            SHA1

                                            f6e5547a35111431f7d4ed4d7e794912ee3536f4

                                            SHA256

                                            1b8efd14b13b151c7c4d6e9372dcff0aa0da8186cef6419833b109ff8d3dcd9e

                                            SHA512

                                            f40cd33e8357effab3279930574818a0adbd3864142758106248d4d12c2a4668c2f1ea3d31bb351c32cbd3306e91f2e44c7f8b3dfecd452bd50eb01133392a2f

                                          • C:\Users\Admin\AppData\Local\Temp\11111.exe

                                            Filesize

                                            311KB

                                            MD5

                                            cc0d6b6813f92dbf5be3ecacf44d662a

                                            SHA1

                                            b968c57a14ddada4128356f6e39fb66c6d864d3f

                                            SHA256

                                            0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498

                                            SHA512

                                            4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

                                          • C:\Users\Admin\AppData\Local\Temp\11111.exe

                                            Filesize

                                            391KB

                                            MD5

                                            7165e9d7456520d1f1644aa26da7c423

                                            SHA1

                                            177f9116229a021e24f80c4059999c4c52f9e830

                                            SHA256

                                            40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67

                                            SHA512

                                            fe80996a7f5c64815c19db1fa582581aa1934ea8d1050e686b4f65bcdd000df1decdf711e0e4b1de8a2aa4fcb1ac95cebb0316017c42e80d8386bd3400fcaecb

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe

                                            Filesize

                                            526KB

                                            MD5

                                            7df1d7d115da507238cf409fa1bd0b91

                                            SHA1

                                            a133c62a14f3871c552a0bcad87a291d5744c2cf

                                            SHA256

                                            2bed8e9c8a557e04ab5f5c3b2a4a26133f62993277dbf0fa0ab574eabb4eddd0

                                            SHA512

                                            2ab249240a4c76d65a225787f2207f38a08cd3e2756bf23c2446343a583fb32a51b5e5674c3af2100a55e53ab49167c462061f251d19e3f89c23526d752c688a

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0318a4864788e065.exe

                                            Filesize

                                            327KB

                                            MD5

                                            47e1245ae15e44e2df28280d95ad2741

                                            SHA1

                                            cb5abc70156154368ff10271fa1c1e80dab6d417

                                            SHA256

                                            c614c4dfbc4fd75a9ccd3ed8b14440de34a7c1945ccf865a414e2e3111162696

                                            SHA512

                                            032df7df40c06266c25a25a2efd945bfd7591dc442b3f4183163491f432f1be8ce2b0554067c3fe02361aeb962bd53d20878db3bec495a52c13787b31dceadeb

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe

                                            Filesize

                                            124KB

                                            MD5

                                            b6f7de71dcc4573e5e5588d6876311fc

                                            SHA1

                                            645b41e6ea119615db745dd8e776672a4ba59c57

                                            SHA256

                                            73437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad

                                            SHA512

                                            ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe

                                            Filesize

                                            1.9MB

                                            MD5

                                            d1ec05df172b32843f1564bc34feef68

                                            SHA1

                                            29ae8b1a96f294b2f420c7710c81740e79eb2b91

                                            SHA256

                                            e7bfb6e1cba02dd07c20e937a535193f25e87194be8fa6f949a967dc7bd919cf

                                            SHA512

                                            500e55b9976837acf11c97021361f7a57c7425f25e95aab20f5d83fe5c8d582de7bcae0b500cbaf85da52fc739aaaef7a3bd5f8d8b500820b83a0bbd286d26fb

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe

                                            Filesize

                                            1.7MB

                                            MD5

                                            99918fe3d5011f5e084492e0d9701779

                                            SHA1

                                            55f7a03c6380bb9f51793be0774681b473e07c9f

                                            SHA256

                                            558a67043fbcd0bc37d34c99ff16f66b259b24b44811516ceff678964ec655c4

                                            SHA512

                                            682f1c6c648319c974e608defa41b714d0e8c3670d3f5e669b7227aaf5400285f9f0c6c5c82c50518031d8a93a3cfd591031651068d5a458a6606f2bf51d3e12

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036bb55bb30d.exe

                                            Filesize

                                            1.1MB

                                            MD5

                                            aa75aa3f07c593b1cd7441f7d8723e14

                                            SHA1

                                            f8e9190ccb6b36474c63ed65a74629ad490f2620

                                            SHA256

                                            af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1

                                            SHA512

                                            b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036f89e9eef8271.exe

                                            Filesize

                                            759KB

                                            MD5

                                            f85794c2bf341a1efe78cdad0b1b4dc5

                                            SHA1

                                            d7ff2be2dafed282b5eda883ee7d02a4eca75194

                                            SHA256

                                            6455d5f4eae530ace507b2ac338777b408e99094acf96bbef7603d7af641b833

                                            SHA512

                                            91f98cff29225a025114013a9ce7423a3e5646725a927606f66577724a691b367004ca8d36ce51f129243a6a87003abd8dd09fa7b195e8ecf70fbc73305f7790

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0376e7a8f67a.exe

                                            Filesize

                                            1.9MB

                                            MD5

                                            a3ba569405d0fa3f577e9c83b6c303af

                                            SHA1

                                            2ba0d6724aa30dc474ee00a06573e8652a117eac

                                            SHA256

                                            2799a1a7d1a6d1e1dc2746bea858c4052cab03833b069beac261a9f4ad56be90

                                            SHA512

                                            f23907f89db9e9bc6ce80faf1577a461de9ddd23009069a3ab4ab8bc18f610a6c5b44bac5469145fdc61ba130755c02baf83783d7a31d0de747d1b11f260ad0d

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03c16839a9b.exe

                                            Filesize

                                            316KB

                                            MD5

                                            8427ae0ce0ded0794b9e0b3dd422702e

                                            SHA1

                                            6e5350072840eb80a09e2c28ce22c2bca8e2aab1

                                            SHA256

                                            8ca5df6f0a4bbc6ae6a0f56b5b2c72e253c4cc72c40919d8984039de8f45e41a

                                            SHA512

                                            90cb046d28eb7e956f99e024a89c05a14cae99580122d99fe49872b36c8f8de95331dd4fee60458b118f96ab40baf770c3f07dbcef2b4b6530832fcb00feac78

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe

                                            Filesize

                                            1.4MB

                                            MD5

                                            28a0b3751b521af221baa3a76f32c8c1

                                            SHA1

                                            f71aaa12ac600549120b062cbbd852b1a1807c43

                                            SHA256

                                            710ceb98e12443d28a9fd280b453eade11bc3483f6280dc224eb48ed327028ca

                                            SHA512

                                            a3773694f59a8f4c7cd06f7dc97c41bf943cf2e9b6283027964890f0122e26c9822e6b91b3ac23eacefa6954b0b983e7dd9226bfb37682f1645f8c85b24fda4f

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03ff1e89e18831.exe

                                            Filesize

                                            1.9MB

                                            MD5

                                            74e88352f861cb12890a36f1e475b4af

                                            SHA1

                                            7dd54ab35260f277b8dcafb556dd66f4667c22d1

                                            SHA256

                                            64578ffca840ebc3f791f1faa21252941d9fd384622d54a28226659ad05650a3

                                            SHA512

                                            18a6911b0d86088d265f49471c52d901a39d1549f9ac36681946a1b91fdb2f71f162ddf4b4659be061302fae6d616852d44c9a151f66eb53bbcc2fde6e7b9463

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\libcurl.dll

                                            Filesize

                                            218KB

                                            MD5

                                            d09be1f47fd6b827c81a4812b4f7296f

                                            SHA1

                                            028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                                            SHA256

                                            0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                                            SHA512

                                            857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\libcurlpp.dll

                                            Filesize

                                            54KB

                                            MD5

                                            e6e578373c2e416289a8da55f1dc5e8e

                                            SHA1

                                            b601a229b66ec3d19c2369b36216c6f6eb1c063e

                                            SHA256

                                            43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                                            SHA512

                                            9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\libgcc_s_dw2-1.dll

                                            Filesize

                                            113KB

                                            MD5

                                            9aec524b616618b0d3d00b27b6f51da1

                                            SHA1

                                            64264300801a353db324d11738ffed876550e1d3

                                            SHA256

                                            59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                                            SHA512

                                            0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\libstdc++-6.dll

                                            Filesize

                                            647KB

                                            MD5

                                            5e279950775baae5fea04d2cc4526bcc

                                            SHA1

                                            8aef1e10031c3629512c43dd8b0b5d9060878453

                                            SHA256

                                            97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                                            SHA512

                                            666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\libwinpthread-1.dll

                                            Filesize

                                            69KB

                                            MD5

                                            1e0d62c34ff2e649ebc5c372065732ee

                                            SHA1

                                            fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                                            SHA256

                                            509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                                            SHA512

                                            3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                                          • C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe

                                            Filesize

                                            2.1MB

                                            MD5

                                            cd66b43b6558d0e17a0e92fd7ac42787

                                            SHA1

                                            90aedefa4b7082676d02568eb31012e40d1d6655

                                            SHA256

                                            ea8907747931024f386f148247b5cf0c1fff53df0d61ab6a1d85c84809511aab

                                            SHA512

                                            5f5848a056eaab118bf2a80fdf5fc0b6262654c9564a955f9e956ed89c102c610346e1d8de75a4b1840166062fe3299b70c049c8f6d25109cc073a91288a0b8b

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_npilyg1e.531.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\e587b17.exe

                                            Filesize

                                            11KB

                                            MD5

                                            620bda3df817bff8deb38758d1dc668c

                                            SHA1

                                            9933523941851b42047f2b7a1324eb8daa8fb1ff

                                            SHA256

                                            b74d7ff45768a1ee6f267e895de3e46cca505edf205563ef3f7db827f38363b3

                                            SHA512

                                            bc9e932860f63090bab251057bc1fd6875c410c2358321eaa74fccc117561b91e4ce6b24d5e7bb13dc44732ae151b7c33fe201acbb5af689d7f2d248dfb8c568

                                          • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

                                            Filesize

                                            31B

                                            MD5

                                            b7161c0845a64ff6d7345b67ff97f3b0

                                            SHA1

                                            d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

                                            SHA256

                                            fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

                                            SHA512

                                            98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

                                          • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

                                            Filesize

                                            1KB

                                            MD5

                                            7f0841790db9c7f1f082c81e976eb103

                                            SHA1

                                            18183bde138f7ceac2f15d9334a53be2c2db3016

                                            SHA256

                                            b32b0673cf09b8f215db036bfb0a6b878937779f5ca525e54f12cd04b27a651a

                                            SHA512

                                            35c6870ebbde32c7dced4100cdebf59cfd6dcf75acca39147971ae4703fb68c4071a2173446c8b67acd3d4d1b0c91dbdf6df157cd7d3ed75922821eeedf163c0

                                          • C:\Users\Admin\AppData\Local\Temp\is-4EEF3.tmp\idp.dll

                                            Filesize

                                            216KB

                                            MD5

                                            b37377d34c8262a90ff95a9a92b65ed8

                                            SHA1

                                            faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                                            SHA256

                                            e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                                            SHA512

                                            69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                                          • C:\Users\Admin\AppData\Local\Temp\is-5S4VA.tmp\Mon034a40f4c2.tmp

                                            Filesize

                                            691KB

                                            MD5

                                            9303156631ee2436db23827e27337be4

                                            SHA1

                                            018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                                            SHA256

                                            bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                                            SHA512

                                            9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                                          • C:\Users\Admin\AppData\Local\Temp\is-SOI5H.tmp\_isetup\_shfoldr.dll

                                            Filesize

                                            22KB

                                            MD5

                                            92dc6ef532fbb4a5c3201469a5b5eb63

                                            SHA1

                                            3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                            SHA256

                                            9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                            SHA512

                                            9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                          • memory/644-150-0x0000000000400000-0x00000000004BD000-memory.dmp

                                            Filesize

                                            756KB

                                          • memory/1040-202-0x0000000005420000-0x0000000005432000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/1040-206-0x00000000054C0000-0x00000000054FC000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/1040-201-0x00000000059C0000-0x0000000005FD8000-memory.dmp

                                            Filesize

                                            6.1MB

                                          • memory/1040-203-0x0000000005550000-0x000000000565A000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/1040-199-0x0000000000400000-0x0000000000420000-memory.dmp

                                            Filesize

                                            128KB

                                          • memory/1332-86-0x0000000000400000-0x0000000000414000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/1332-153-0x0000000000400000-0x0000000000414000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/1800-289-0x000000002DFF0000-0x000000002E0A1000-memory.dmp

                                            Filesize

                                            708KB

                                          • memory/1800-293-0x000000002E0B0000-0x000000002E14C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/1800-311-0x000000002F380000-0x000000002F410000-memory.dmp

                                            Filesize

                                            576KB

                                          • memory/1800-310-0x000000002F2E0000-0x000000002F376000-memory.dmp

                                            Filesize

                                            600KB

                                          • memory/1800-309-0x000000002E150000-0x000000002F2D7000-memory.dmp

                                            Filesize

                                            17.5MB

                                          • memory/1800-239-0x0000000003040000-0x0000000004040000-memory.dmp

                                            Filesize

                                            16.0MB

                                          • memory/1800-308-0x000000002E0B0000-0x000000002E14C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/1800-307-0x0000000003040000-0x0000000004040000-memory.dmp

                                            Filesize

                                            16.0MB

                                          • memory/1800-290-0x000000002E0B0000-0x000000002E14C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/1800-291-0x000000002E0B0000-0x000000002E14C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/2052-103-0x000001D74D180000-0x000001D74D1D8000-memory.dmp

                                            Filesize

                                            352KB

                                          • memory/2052-132-0x000001D74D5D0000-0x000001D74D5D6000-memory.dmp

                                            Filesize

                                            24KB

                                          • memory/2052-119-0x000001D74D590000-0x000001D74D5D6000-memory.dmp

                                            Filesize

                                            280KB

                                          • memory/2052-104-0x000001D74D580000-0x000001D74D586000-memory.dmp

                                            Filesize

                                            24KB

                                          • memory/2972-426-0x0000000000100000-0x0000000000108000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/3256-301-0x0000000000400000-0x00000000004BD000-memory.dmp

                                            Filesize

                                            756KB

                                          • memory/3900-193-0x0000000000400000-0x0000000000455000-memory.dmp

                                            Filesize

                                            340KB

                                          • memory/3948-180-0x0000000000400000-0x00000000004DE000-memory.dmp

                                            Filesize

                                            888KB

                                          • memory/3948-98-0x0000000000400000-0x00000000004DE000-memory.dmp

                                            Filesize

                                            888KB

                                          • memory/4040-300-0x0000000000400000-0x0000000000414000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4040-147-0x0000000000400000-0x0000000000414000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4064-82-0x0000000003260000-0x0000000003296000-memory.dmp

                                            Filesize

                                            216KB

                                          • memory/4064-115-0x0000000005A00000-0x0000000005A22000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/4064-212-0x00000000077F0000-0x0000000007822000-memory.dmp

                                            Filesize

                                            200KB

                                          • memory/4064-213-0x000000006DDE0000-0x000000006DE2C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4064-234-0x0000000006DE0000-0x0000000006DFE000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/4064-235-0x0000000007A30000-0x0000000007AD3000-memory.dmp

                                            Filesize

                                            652KB

                                          • memory/4064-118-0x0000000006260000-0x00000000065B4000-memory.dmp

                                            Filesize

                                            3.3MB

                                          • memory/4064-83-0x0000000005A40000-0x0000000006068000-memory.dmp

                                            Filesize

                                            6.2MB

                                          • memory/4064-240-0x0000000007B70000-0x0000000007B8A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/4064-117-0x00000000061D0000-0x0000000006236000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/4064-116-0x0000000006160000-0x00000000061C6000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/4368-105-0x00000000048F0000-0x000000000490E000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/4368-129-0x0000000004FD0000-0x0000000005574000-memory.dmp

                                            Filesize

                                            5.6MB

                                          • memory/4368-94-0x0000000000070000-0x00000000000FA000-memory.dmp

                                            Filesize

                                            552KB

                                          • memory/4368-100-0x0000000004920000-0x0000000004996000-memory.dmp

                                            Filesize

                                            472KB

                                          • memory/4376-298-0x0000000000400000-0x000000000053F000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/4448-359-0x000000002D420000-0x000000002E5A7000-memory.dmp

                                            Filesize

                                            17.5MB

                                          • memory/4448-358-0x000000002D380000-0x000000002D41C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/4448-356-0x0000000002390000-0x0000000003390000-memory.dmp

                                            Filesize

                                            16.0MB

                                          • memory/4448-360-0x000000002E5B0000-0x000000002E646000-memory.dmp

                                            Filesize

                                            600KB

                                          • memory/4448-361-0x000000002E650000-0x000000002E6E0000-memory.dmp

                                            Filesize

                                            576KB

                                          • memory/4448-354-0x000000002D380000-0x000000002D41C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/4448-352-0x000000002D380000-0x000000002D41C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/4448-350-0x000000002D380000-0x000000002D41C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/4448-349-0x000000002D2C0000-0x000000002D371000-memory.dmp

                                            Filesize

                                            708KB

                                          • memory/4448-314-0x0000000002390000-0x0000000003390000-memory.dmp

                                            Filesize

                                            16.0MB

                                          • memory/4448-364-0x000000002E650000-0x000000002E6E0000-memory.dmp

                                            Filesize

                                            576KB

                                          • memory/4448-368-0x00000000000B0000-0x00000000000B5000-memory.dmp

                                            Filesize

                                            20KB

                                          • memory/4448-367-0x00000000000A0000-0x00000000000A3000-memory.dmp

                                            Filesize

                                            12KB

                                          • memory/4580-261-0x0000000006F60000-0x0000000006F74000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/4580-263-0x0000000007040000-0x0000000007048000-memory.dmp

                                            Filesize

                                            32KB

                                          • memory/4580-224-0x000000006DDE0000-0x000000006DE2C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4580-241-0x00000000073C0000-0x0000000007A3A000-memory.dmp

                                            Filesize

                                            6.5MB

                                          • memory/4580-244-0x0000000006DA0000-0x0000000006DAA000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/4580-167-0x0000000005A00000-0x0000000005A1E000-memory.dmp

                                            Filesize

                                            120KB

                                          • memory/4580-168-0x0000000005D00000-0x0000000005D4C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/4580-247-0x0000000006F90000-0x0000000007026000-memory.dmp

                                            Filesize

                                            600KB

                                          • memory/4580-250-0x0000000006F20000-0x0000000006F31000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/4580-251-0x0000000006F50000-0x0000000006F5E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/4580-262-0x0000000007050000-0x000000000706A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/4696-246-0x0000000000400000-0x00000000004D3000-memory.dmp

                                            Filesize

                                            844KB

                                          • memory/4872-176-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/4872-57-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/4872-63-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/4872-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/4872-64-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/4872-62-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/4872-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/4872-70-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                            Filesize

                                            152KB

                                          • memory/4872-68-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/4872-175-0x000000006EB40000-0x000000006EB63000-memory.dmp

                                            Filesize

                                            140KB

                                          • memory/4872-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/4872-177-0x0000000064940000-0x0000000064959000-memory.dmp

                                            Filesize

                                            100KB

                                          • memory/4872-178-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                            Filesize

                                            152KB

                                          • memory/4872-67-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                            Filesize

                                            1.5MB

                                          • memory/4872-170-0x0000000000400000-0x000000000051C000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/4872-48-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                            Filesize

                                            152KB

                                          • memory/4872-69-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                            Filesize

                                            152KB

                                          • memory/4872-58-0x0000000000F60000-0x0000000000FEF000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/4872-59-0x000000006494A000-0x000000006494F000-memory.dmp

                                            Filesize

                                            20KB

                                          • memory/4872-179-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/4872-60-0x0000000064940000-0x0000000064959000-memory.dmp

                                            Filesize

                                            100KB

                                          • memory/4928-274-0x0000000000400000-0x000000000047C000-memory.dmp

                                            Filesize

                                            496KB