Malware Analysis Report

2025-01-02 06:01

Sample ID 241123-tsy6xaxndz
Target e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe
SHA256 e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5
Tags
fabookie nullmixer redline socelars vidar 915 media25pqs aspackv2 discovery dropper execution infostealer spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5

Threat Level: Known bad

The file e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe was found to be: Known bad.

Malicious Activity Summary

fabookie nullmixer redline socelars vidar 915 media25pqs aspackv2 discovery dropper execution infostealer spyware stealer

Fabookie

Socelars

Nullmixer family

Socelars payload

Fabookie family

RedLine

Detect Fabookie payload

NullMixer

RedLine payload

Socelars family

Redline family

Vidar

Vidar family

Detected Nirsoft tools

NirSoft WebBrowserPassView

Vidar Stealer

Command and Scripting Interpreter: PowerShell

Command and Scripting Interpreter: PowerShell

Blocklisted process makes network request

Executes dropped EXE

Reads user/profile data of web browsers

ASPack v2.12-2.42

Loads dropped DLL

Checks computer location settings

Drops Chrome extension

Looks up external IP address via web service

Legitimate hosting services abused for malware hosting/C2

Checks installed software on the system

Looks up geolocation information via web service

Suspicious use of SetThreadContext

Browser Information Discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Unsigned PE

Program crash

Modifies system certificate store

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Kills process with taskkill

Enumerates system info in registry

Checks SCSI registry key(s)

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious use of SendNotifyMessage

Modifies registry class

Suspicious behavior: EnumeratesProcesses

Modifies data under HKEY_USERS

Suspicious use of FindShellTrayWindow

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-23 16:19

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-23 16:19

Reported

2024-11-23 16:21

Platform

win10v2004-20241007-en

Max time kernel

120s

Max time network

117s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

Fabookie family

fabookie

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\rundll32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0376e7a8f67a.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\is-5S4VA.tmp\Mon034a40f4c2.tmp N/A
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03ff1e89e18831.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03c16839a9b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036bb55bb30d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036f89e9eef8271.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-5S4VA.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0376e7a8f67a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-MO5BV.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0318a4864788e065.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e587b17.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfhgpjbcoignfibliobpclhpfnadhofn\10.59.13_0\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Looks up geolocation information via web service

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4368 set thread context of 1040 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-MO5BV.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0318a4864788e065.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036f89e9eef8271.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-5S4VA.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e587b17.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036bb55bb30d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0376e7a8f67a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0318a4864788e065.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0318a4864788e065.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0318a4864788e065.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133768524315962609" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0376e7a8f67a.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03c16839a9b.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2000 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe
PID 2000 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe
PID 2000 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe
PID 4872 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 4900 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 4900 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 4900 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2228 wrote to memory of 4064 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2228 wrote to memory of 4064 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2228 wrote to memory of 4064 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4900 wrote to memory of 4580 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4900 wrote to memory of 4580 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4900 wrote to memory of 4580 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4872 wrote to memory of 216 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 216 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 216 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 1608 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 2148 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 4532 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 3192 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 3192 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 3192 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 440 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 440 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 440 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 4472 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 4472 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 4472 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 1336 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 412 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 412 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 412 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 464 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 464 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4872 wrote to memory of 464 N/A C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1608 wrote to memory of 1332 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe
PID 1608 wrote to memory of 1332 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe
PID 1608 wrote to memory of 1332 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe
PID 1876 wrote to memory of 1232 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe
PID 1876 wrote to memory of 1232 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe
PID 1876 wrote to memory of 1232 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe
PID 2148 wrote to memory of 4368 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe
PID 2148 wrote to memory of 4368 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe
PID 2148 wrote to memory of 4368 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe
PID 4532 wrote to memory of 2700 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe
PID 4532 wrote to memory of 2700 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe
PID 4532 wrote to memory of 2700 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe
PID 3192 wrote to memory of 2188 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03ff1e89e18831.exe
PID 3192 wrote to memory of 2188 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03ff1e89e18831.exe
PID 216 wrote to memory of 4512 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe
PID 216 wrote to memory of 4512 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe

Processes

C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe"

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03f186a0d10.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0337242833e.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon034a40f4c2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03184374b6827dae2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0333ecac229eb22.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03ff1e89e18831.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036f89e9eef8271.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0376e7a8f67a.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0318a4864788e065.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03c16839a9b.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036bb55bb30d.exe /mixtwo

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe

Mon0337242833e.exe

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe

Mon034a40f4c2.exe

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe

Mon03f186a0d10.exe

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03ff1e89e18831.exe

Mon03ff1e89e18831.exe

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0376e7a8f67a.exe

Mon0376e7a8f67a.exe

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe

Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036bb55bb30d.exe

Mon036bb55bb30d.exe /mixtwo

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03c16839a9b.exe

Mon03c16839a9b.exe

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe

Mon0333ecac229eb22.exe

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036f89e9eef8271.exe

Mon036f89e9eef8271.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4872 -ip 4872

C:\Users\Admin\AppData\Local\Temp\is-5S4VA.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-5S4VA.tmp\Mon034a40f4c2.tmp" /SL5="$40178,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3948 -ip 3948

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 588

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 408

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe

"C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe" -u

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe

"C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe" /SILENT

C:\Users\Admin\AppData\Local\Temp\is-MO5BV.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-MO5BV.tmp\Mon034a40f4c2.tmp" /SL5="$B0142,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe" /SILENT

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0318a4864788e065.exe

Mon0318a4864788e065.exe

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4696 -ip 4696

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 236

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd1496cc40,0x7ffd1496cc4c,0x7ffd1496cc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2136,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2616 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3068,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3092 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3112,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4488,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3640,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4652 /prefetch:8

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4504,i,15041495497816699556,7591180310355052000,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4692 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc

C:\Users\Admin\AppData\Local\Temp\e587b17.exe

"C:\Users\Admin\AppData\Local\Temp\e587b17.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2972 -ip 2972

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 788

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 hornygl.xyz udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 www.listincode.com udp
US 8.8.8.8:53 iplogger.org udp
US 8.8.8.8:53 ip-api.com udp
US 104.26.3.46:443 iplogger.org tcp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.200.3:80 c.pki.goog tcp
US 8.8.8.8:53 datingmart.me udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 46.3.26.104.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 mstdn.social udp
DE 49.13.236.103:443 mstdn.social tcp
US 8.8.8.8:53 3.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 103.236.13.49.in-addr.arpa udp
US 8.8.8.8:53 bthuu.com udp
US 8.8.8.8:53 r11.o.lencr.org udp
FR 2.21.132.163:80 r11.o.lencr.org tcp
US 8.8.8.8:53 55.221.32.23.in-addr.arpa udp
US 8.8.8.8:53 163.132.21.2.in-addr.arpa udp
US 8.8.8.8:53 qoto.org udp
US 100.24.65.138:443 qoto.org tcp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 r10.o.lencr.org udp
US 8.8.8.8:53 138.65.24.100.in-addr.arpa udp
FR 2.21.132.163:80 r10.o.lencr.org tcp
N/A 127.0.0.1:64083 tcp
N/A 127.0.0.1:64085 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 35.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
GB 172.217.16.228:443 www.google.com tcp
GB 172.217.16.228:443 www.google.com tcp
GB 172.217.16.228:443 www.google.com tcp
US 8.8.8.8:53 www.hhiuew33.com udp
GB 172.217.16.228:443 www.google.com udp
US 8.8.8.8:53 42.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 228.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 clients2.google.com udp
GB 142.250.178.14:443 clients2.google.com tcp
US 8.8.8.8:53 14.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
FI 65.108.69.168:13293 tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 26.180.123.92.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FR 77.233.110.97:8080 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 udp

Files

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\setup_install.exe

MD5 cd66b43b6558d0e17a0e92fd7ac42787
SHA1 90aedefa4b7082676d02568eb31012e40d1d6655
SHA256 ea8907747931024f386f148247b5cf0c1fff53df0d61ab6a1d85c84809511aab
SHA512 5f5848a056eaab118bf2a80fdf5fc0b6262654c9564a955f9e956ed89c102c610346e1d8de75a4b1840166062fe3299b70c049c8f6d25109cc073a91288a0b8b

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

memory/4872-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4872-60-0x0000000064940000-0x0000000064959000-memory.dmp

memory/4872-59-0x000000006494A000-0x000000006494F000-memory.dmp

memory/4872-58-0x0000000000F60000-0x0000000000FEF000-memory.dmp

memory/4872-57-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4872-48-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

memory/4872-63-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4872-69-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/4872-70-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/4872-68-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4872-67-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4872-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4872-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4872-64-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4872-62-0x000000006B440000-0x000000006B4CF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03c16839a9b.exe

MD5 8427ae0ce0ded0794b9e0b3dd422702e
SHA1 6e5350072840eb80a09e2c28ce22c2bca8e2aab1
SHA256 8ca5df6f0a4bbc6ae6a0f56b5b2c72e253c4cc72c40919d8984039de8f45e41a
SHA512 90cb046d28eb7e956f99e024a89c05a14cae99580122d99fe49872b36c8f8de95331dd4fee60458b118f96ab40baf770c3f07dbcef2b4b6530832fcb00feac78

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036bb55bb30d.exe

MD5 aa75aa3f07c593b1cd7441f7d8723e14
SHA1 f8e9190ccb6b36474c63ed65a74629ad490f2620
SHA256 af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1
SHA512 b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0318a4864788e065.exe

MD5 47e1245ae15e44e2df28280d95ad2741
SHA1 cb5abc70156154368ff10271fa1c1e80dab6d417
SHA256 c614c4dfbc4fd75a9ccd3ed8b14440de34a7c1945ccf865a414e2e3111162696
SHA512 032df7df40c06266c25a25a2efd945bfd7591dc442b3f4183163491f432f1be8ce2b0554067c3fe02361aeb962bd53d20878db3bec495a52c13787b31dceadeb

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0376e7a8f67a.exe

MD5 a3ba569405d0fa3f577e9c83b6c303af
SHA1 2ba0d6724aa30dc474ee00a06573e8652a117eac
SHA256 2799a1a7d1a6d1e1dc2746bea858c4052cab03833b069beac261a9f4ad56be90
SHA512 f23907f89db9e9bc6ce80faf1577a461de9ddd23009069a3ab4ab8bc18f610a6c5b44bac5469145fdc61ba130755c02baf83783d7a31d0de747d1b11f260ad0d

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon036f89e9eef8271.exe

MD5 f85794c2bf341a1efe78cdad0b1b4dc5
SHA1 d7ff2be2dafed282b5eda883ee7d02a4eca75194
SHA256 6455d5f4eae530ace507b2ac338777b408e99094acf96bbef7603d7af641b833
SHA512 91f98cff29225a025114013a9ce7423a3e5646725a927606f66577724a691b367004ca8d36ce51f129243a6a87003abd8dd09fa7b195e8ecf70fbc73305f7790

memory/4064-82-0x0000000003260000-0x0000000003296000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03ff1e89e18831.exe

MD5 74e88352f861cb12890a36f1e475b4af
SHA1 7dd54ab35260f277b8dcafb556dd66f4667c22d1
SHA256 64578ffca840ebc3f791f1faa21252941d9fd384622d54a28226659ad05650a3
SHA512 18a6911b0d86088d265f49471c52d901a39d1549f9ac36681946a1b91fdb2f71f162ddf4b4659be061302fae6d616852d44c9a151f66eb53bbcc2fde6e7b9463

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0333ecac229eb22.exe

MD5 b6f7de71dcc4573e5e5588d6876311fc
SHA1 645b41e6ea119615db745dd8e776672a4ba59c57
SHA256 73437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad
SHA512 ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03184374b6827dae2.exe

MD5 7df1d7d115da507238cf409fa1bd0b91
SHA1 a133c62a14f3871c552a0bcad87a291d5744c2cf
SHA256 2bed8e9c8a557e04ab5f5c3b2a4a26133f62993277dbf0fa0ab574eabb4eddd0
SHA512 2ab249240a4c76d65a225787f2207f38a08cd3e2756bf23c2446343a583fb32a51b5e5674c3af2100a55e53ab49167c462061f251d19e3f89c23526d752c688a

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon034a40f4c2.exe

MD5 99918fe3d5011f5e084492e0d9701779
SHA1 55f7a03c6380bb9f51793be0774681b473e07c9f
SHA256 558a67043fbcd0bc37d34c99ff16f66b259b24b44811516ceff678964ec655c4
SHA512 682f1c6c648319c974e608defa41b714d0e8c3670d3f5e669b7227aaf5400285f9f0c6c5c82c50518031d8a93a3cfd591031651068d5a458a6606f2bf51d3e12

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon0337242833e.exe

MD5 d1ec05df172b32843f1564bc34feef68
SHA1 29ae8b1a96f294b2f420c7710c81740e79eb2b91
SHA256 e7bfb6e1cba02dd07c20e937a535193f25e87194be8fa6f949a967dc7bd919cf
SHA512 500e55b9976837acf11c97021361f7a57c7425f25e95aab20f5d83fe5c8d582de7bcae0b500cbaf85da52fc739aaaef7a3bd5f8d8b500820b83a0bbd286d26fb

C:\Users\Admin\AppData\Local\Temp\7zS0D754367\Mon03f186a0d10.exe

MD5 28a0b3751b521af221baa3a76f32c8c1
SHA1 f71aaa12ac600549120b062cbbd852b1a1807c43
SHA256 710ceb98e12443d28a9fd280b453eade11bc3483f6280dc224eb48ed327028ca
SHA512 a3773694f59a8f4c7cd06f7dc97c41bf943cf2e9b6283027964890f0122e26c9822e6b91b3ac23eacefa6954b0b983e7dd9226bfb37682f1645f8c85b24fda4f

memory/4064-83-0x0000000005A40000-0x0000000006068000-memory.dmp

memory/1332-86-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4368-94-0x0000000000070000-0x00000000000FA000-memory.dmp

memory/3948-98-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/2052-103-0x000001D74D180000-0x000001D74D1D8000-memory.dmp

memory/4368-105-0x00000000048F0000-0x000000000490E000-memory.dmp

memory/2052-104-0x000001D74D580000-0x000001D74D586000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-5S4VA.tmp\Mon034a40f4c2.tmp

MD5 9303156631ee2436db23827e27337be4
SHA1 018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256 bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA512 9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

C:\Users\Admin\AppData\Local\Temp\is-4EEF3.tmp\idp.dll

MD5 b37377d34c8262a90ff95a9a92b65ed8
SHA1 faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256 e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA512 69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

memory/4064-117-0x00000000061D0000-0x0000000006236000-memory.dmp

memory/4368-129-0x0000000004FD0000-0x0000000005574000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_npilyg1e.531.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2052-132-0x000001D74D5D0000-0x000001D74D5D6000-memory.dmp

memory/2052-119-0x000001D74D590000-0x000001D74D5D6000-memory.dmp

memory/644-150-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/4040-147-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1332-153-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4064-118-0x0000000006260000-0x00000000065B4000-memory.dmp

memory/4064-116-0x0000000006160000-0x00000000061C6000-memory.dmp

memory/4064-115-0x0000000005A00000-0x0000000005A22000-memory.dmp

memory/4368-100-0x0000000004920000-0x0000000004996000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-SOI5H.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

memory/4580-168-0x0000000005D00000-0x0000000005D4C000-memory.dmp

memory/4580-167-0x0000000005A00000-0x0000000005A1E000-memory.dmp

memory/4872-170-0x0000000000400000-0x000000000051C000-memory.dmp

memory/3948-180-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/4872-179-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/4872-178-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/4872-177-0x0000000064940000-0x0000000064959000-memory.dmp

memory/4872-176-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/4872-175-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/3900-193-0x0000000000400000-0x0000000000455000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 b968c57a14ddada4128356f6e39fb66c6d864d3f
SHA256 0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
SHA512 4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

memory/1040-199-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1040-203-0x0000000005550000-0x000000000565A000-memory.dmp

memory/1040-201-0x00000000059C0000-0x0000000005FD8000-memory.dmp

memory/1040-206-0x00000000054C0000-0x00000000054FC000-memory.dmp

memory/1040-202-0x0000000005420000-0x0000000005432000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Mon03184374b6827dae2.exe.log

MD5 e5352797047ad2c91b83e933b24fbc4f
SHA1 9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256 b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512 dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

memory/4064-212-0x00000000077F0000-0x0000000007822000-memory.dmp

memory/4064-213-0x000000006DDE0000-0x000000006DE2C000-memory.dmp

memory/4064-234-0x0000000006DE0000-0x0000000006DFE000-memory.dmp

memory/4064-235-0x0000000007A30000-0x0000000007AD3000-memory.dmp

memory/4580-224-0x000000006DDE0000-0x000000006DE2C000-memory.dmp

memory/4580-241-0x00000000073C0000-0x0000000007A3A000-memory.dmp

memory/4064-240-0x0000000007B70000-0x0000000007B8A000-memory.dmp

memory/1800-239-0x0000000003040000-0x0000000004040000-memory.dmp

memory/4580-244-0x0000000006DA0000-0x0000000006DAA000-memory.dmp

memory/4696-246-0x0000000000400000-0x00000000004D3000-memory.dmp

memory/4580-247-0x0000000006F90000-0x0000000007026000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

MD5 b7161c0845a64ff6d7345b67ff97f3b0
SHA1 d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256 fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA512 98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

memory/4580-250-0x0000000006F20000-0x0000000006F31000-memory.dmp

memory/4580-251-0x0000000006F50000-0x0000000006F5E000-memory.dmp

memory/4580-261-0x0000000006F60000-0x0000000006F74000-memory.dmp

memory/4580-262-0x0000000007050000-0x000000000706A000-memory.dmp

memory/4580-263-0x0000000007040000-0x0000000007048000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 3d086a433708053f9bf9523e1d87a4e8
SHA1 b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA256 6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512 931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 3cd06df8626eaecac2319f8dc4de18b5
SHA1 f6e5547a35111431f7d4ed4d7e794912ee3536f4
SHA256 1b8efd14b13b151c7c4d6e9372dcff0aa0da8186cef6419833b109ff8d3dcd9e
SHA512 f40cd33e8357effab3279930574818a0adbd3864142758106248d4d12c2a4668c2f1ea3d31bb351c32cbd3306e91f2e44c7f8b3dfecd452bd50eb01133392a2f

memory/4928-274-0x0000000000400000-0x000000000047C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 7165e9d7456520d1f1644aa26da7c423
SHA1 177f9116229a021e24f80c4059999c4c52f9e830
SHA256 40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
SHA512 fe80996a7f5c64815c19db1fa582581aa1934ea8d1050e686b4f65bcdd000df1decdf711e0e4b1de8a2aa4fcb1ac95cebb0316017c42e80d8386bd3400fcaecb

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 09ed7abe7f53f088a521e8d81f6c3dc6
SHA1 d8b0fceab80957b44e24fb0f11dec0dbf8a944db
SHA256 0452f6ded757cc1b7cba91b9ef98912d44c33d8b3613c6901f997b4bdbf47b6d
SHA512 1c9ebefcc5512d1737c736a68c24cb9888018c65e297121fe175ccdc117999545742170ce04ddfa6812136636eb8c5c7b53b329a7719f6c406617c67770d3c7d

\??\pipe\crashpad_464_JHZYUVXLLNFORLBQ

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/1800-289-0x000000002DFF0000-0x000000002E0A1000-memory.dmp

memory/1800-290-0x000000002E0B0000-0x000000002E14C000-memory.dmp

memory/1800-291-0x000000002E0B0000-0x000000002E14C000-memory.dmp

memory/1800-293-0x000000002E0B0000-0x000000002E14C000-memory.dmp

memory/4376-298-0x0000000000400000-0x000000000053F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

MD5 7f0841790db9c7f1f082c81e976eb103
SHA1 18183bde138f7ceac2f15d9334a53be2c2db3016
SHA256 b32b0673cf09b8f215db036bfb0a6b878937779f5ca525e54f12cd04b27a651a
SHA512 35c6870ebbde32c7dced4100cdebf59cfd6dcf75acca39147971ae4703fb68c4071a2173446c8b67acd3d4d1b0c91dbdf6df157cd7d3ed75922821eeedf163c0

memory/3256-301-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/4040-300-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\c8673b9f-0968-409c-a10a-6a6005bf1951.tmp

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

memory/1800-307-0x0000000003040000-0x0000000004040000-memory.dmp

memory/1800-308-0x000000002E0B0000-0x000000002E14C000-memory.dmp

memory/1800-309-0x000000002E150000-0x000000002F2D7000-memory.dmp

memory/1800-310-0x000000002F2E0000-0x000000002F376000-memory.dmp

memory/1800-311-0x000000002F380000-0x000000002F410000-memory.dmp

memory/4448-314-0x0000000002390000-0x0000000003390000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 2e548b07c1505ebdbd4b65941d82363b
SHA1 a224ed186fbca4b307c754719dea6a10cea15130
SHA256 065d7da8c26b65895ad2c5e3aa86ea657e8de218295e179ed1aa98bc530ee1c6
SHA512 8d50bb6b86220737284feefb6167d234563a8d15d054bcada004f25841d84751c5f51c61e3392a260eef7697008aa53ebd993b2b69abbd2914c9b3dcb5857270

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 93d5ae52f68158a26e78d72afa1f5dc3
SHA1 417bc10878b1e5c1b66e8d1bf98d8020c2587599
SHA256 83ad800949097df24bc457694a9a1c31405ed287e9401330f2a2d08221bde129
SHA512 46f146a2d3948e1d243a864ee944854ea5794384619eccac735dc9ab3a6312ab8c075ce6cc161e617ae0548b969feafe6995d00561b1d54770585da0a0f20855

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 718c87d47272dbbf28fd3d3a0a6f434f
SHA1 343925f5a531de8f0556b15be381c4c7890a33b4
SHA256 bb675bbd2e499d951798a97aa0700b429f19a137f7a7a5a6ccfbec9623786586
SHA512 2569399a88bbf28b659fc37cadad5a9257bada0d293ddbb6dea8447ed8174523b96e472784feb88f4e660fb6b41946572814c13afa9a4c23c098018a82d51bbf

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 a62ab02fc58c8b6280c0ecb6d922e96e
SHA1 f62a2cafc8ecd32d4c467d33ac1d41a4d040eae1
SHA256 b1f8ba3db92dd1371a36cbb0bec4da34525839ece3e6648df709abe9774b0a57
SHA512 f87117b61a63fafb0f23d7d80569d9f9e0842fb81e2268895d42235a3cd0a85736134b527e2662f5333dde47cda129933a2a2000731cfe85f879b1236f59cc03

memory/4448-349-0x000000002D2C0000-0x000000002D371000-memory.dmp

memory/4448-350-0x000000002D380000-0x000000002D41C000-memory.dmp

memory/4448-352-0x000000002D380000-0x000000002D41C000-memory.dmp

memory/4448-354-0x000000002D380000-0x000000002D41C000-memory.dmp

memory/4448-356-0x0000000002390000-0x0000000003390000-memory.dmp

memory/4448-358-0x000000002D380000-0x000000002D41C000-memory.dmp

memory/4448-359-0x000000002D420000-0x000000002E5A7000-memory.dmp

memory/4448-360-0x000000002E5B0000-0x000000002E646000-memory.dmp

memory/4448-361-0x000000002E650000-0x000000002E6E0000-memory.dmp

memory/4448-364-0x000000002E650000-0x000000002E6E0000-memory.dmp

memory/4448-368-0x00000000000B0000-0x00000000000B5000-memory.dmp

memory/4448-367-0x00000000000A0000-0x00000000000A3000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

MD5 28fdc09a25e028344f0ed79b5224a406
SHA1 905bfae40d373f830dbbb9a0365e7640d2e671eb
SHA256 dd7e0aacaa5b2f1decece770a32dcb23b75165a60d18109208365525947f9e67
SHA512 8ac108a77102e506c3073228548cfadbc4b6fc04448a1366bfb9e615640679665d00f10856537f3ae377e9763091daf56690dd0d7e36f13201ee90db4c6beba0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 e714570160bd373b43d622acefc0323f
SHA1 806edf8e728510a963a3cfa4daa8bb7eef8a6449
SHA256 8ced255291513365b09c712911e37744f00ae6038afbfc96f30cbc3aff4dfdf8
SHA512 afe22056e5b9bdca6c39983eb827895505a34da9b7f8d1e754d38ae3507fb745818a2816f562e510784be3d29a2f22c4c7feab439a3180efd36f54703064ff24

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 4a1f0148d40a32a70ae0c75497fe2ce4
SHA1 28454abb0cc3bd1942d776cd37dda5f638acaab3
SHA256 6d32f114f6ef96fb5cdc8b0d2cb9f3c5966f87e759a1d0906de45117fc0b25aa
SHA512 42c4bc412f873c75792097862b6ee42b1a6c61ab113992ace47d3ff3d40f5bd50eb0e2fcf956cb6bcea89f09307858c035aee7d1921fe6c157f0f1ed42b1de30

C:\Users\Admin\AppData\Local\Temp\e587b17.exe

MD5 620bda3df817bff8deb38758d1dc668c
SHA1 9933523941851b42047f2b7a1324eb8daa8fb1ff
SHA256 b74d7ff45768a1ee6f267e895de3e46cca505edf205563ef3f7db827f38363b3
SHA512 bc9e932860f63090bab251057bc1fd6875c410c2358321eaa74fccc117561b91e4ce6b24d5e7bb13dc44732ae151b7c33fe201acbb5af689d7f2d248dfb8c568

memory/2972-426-0x0000000000100000-0x0000000000108000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 55dc23faaec48cd9be06639a998eb16b
SHA1 5d9dfd7b54bace7e908779e886863dc6f8b6e48d
SHA256 998d6db5f27017ff665d374079d78d55d366c9fd1121020e3f6b92c5a622b943
SHA512 9cc5587efd5d0144df07188c309bd175c6a3e156f9ea78265bbaa2f2aab7b7f11b84105f0337dd6a7856d0b85e2bce690fa29669b67c80ef07e027ab86ebf6af

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 5b0c408ec51568141f1b0247a2c091d7
SHA1 6ffccf76f49009d3399e6e797265904abaa83fc5
SHA256 dd6415003de95a3674024245ffe3fa32085c6d1e6bf15a8aabab315447a2a0c9
SHA512 8f694ee1a388e777c5af4638845d0a6db840ae62ae32599b1517836c22d5e95bff2e300bfa6c4fc85533e0a49dc4a1ab2e802be66a3efb725001a92290d66800

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-23 16:19

Reported

2024-11-23 16:22

Platform

win7-20241010-en

Max time kernel

59s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

Fabookie family

fabookie

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0337242833e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0337242833e.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0376e7a8f67a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0376e7a8f67a.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036f89e9eef8271.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036f89e9eef8271.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0318a4864788e065.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0318a4864788e065.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036bb55bb30d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036bb55bb30d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-GKTBE.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-GKTBE.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-GKTBE.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-GKTBE.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Looks up geolocation information via web service

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2332 set thread context of 956 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0376e7a8f67a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036bb55bb30d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0337242833e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-LU158.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036f89e9eef8271.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0318a4864788e065.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-GKTBE.tmp\Mon034a40f4c2.tmp N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036f89e9eef8271.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036f89e9eef8271.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03c16839a9b.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2476 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe
PID 2476 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe
PID 2476 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe
PID 2476 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe
PID 2476 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe
PID 2476 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe
PID 2476 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe
PID 2840 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 3012 wrote to memory of 1980 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3012 wrote to memory of 1980 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3012 wrote to memory of 1980 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3012 wrote to memory of 1980 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3012 wrote to memory of 1980 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3012 wrote to memory of 1980 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3012 wrote to memory of 1980 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2840 wrote to memory of 1056 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1056 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1056 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1056 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1056 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1056 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1056 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2968 wrote to memory of 1444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2968 wrote to memory of 1444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2968 wrote to memory of 1444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2968 wrote to memory of 1444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2968 wrote to memory of 1444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2968 wrote to memory of 1444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2968 wrote to memory of 1444 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2840 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 1448 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2308 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2168 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2840 wrote to memory of 2172 N/A C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe"

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03f186a0d10.exe

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0337242833e.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon034a40f4c2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03184374b6827dae2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0333ecac229eb22.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03ff1e89e18831.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036f89e9eef8271.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0376e7a8f67a.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0318a4864788e065.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03c16839a9b.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036bb55bb30d.exe /mixtwo

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe

Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03ff1e89e18831.exe

Mon03ff1e89e18831.exe

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0337242833e.exe

Mon0337242833e.exe

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0376e7a8f67a.exe

Mon0376e7a8f67a.exe

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe

Mon034a40f4c2.exe

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe

Mon03f186a0d10.exe

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03c16839a9b.exe

Mon03c16839a9b.exe

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe

Mon0333ecac229eb22.exe

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe

"C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe" -u

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0318a4864788e065.exe

Mon0318a4864788e065.exe

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036f89e9eef8271.exe

Mon036f89e9eef8271.exe

C:\Users\Admin\AppData\Local\Temp\is-GKTBE.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-GKTBE.tmp\Mon034a40f4c2.tmp" /SL5="$40184,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe"

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036bb55bb30d.exe

Mon036bb55bb30d.exe /mixtwo

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 460

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 268

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe

"C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe" /SILENT

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 276

C:\Users\Admin\AppData\Local\Temp\is-LU158.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-LU158.tmp\Mon034a40f4c2.tmp" /SL5="$40182,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe" /SILENT

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2400 -s 1036

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2964 -s 488

Network

Country Destination Domain Proto
US 8.8.8.8:53 hornygl.xyz udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 www.listincode.com udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 mstdn.social udp
DE 49.13.236.103:443 mstdn.social tcp
US 8.8.8.8:53 bthuu.com udp
N/A 127.0.0.1:49283 tcp
N/A 127.0.0.1:49285 tcp
DE 49.13.236.103:443 mstdn.social tcp
DE 49.13.236.103:443 mstdn.social tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.200.3:80 c.pki.goog tcp
DE 49.13.236.103:443 mstdn.social tcp
US 8.8.8.8:53 qoto.org udp
US 100.24.65.138:443 qoto.org tcp
US 8.8.8.8:53 r10.o.lencr.org udp
FR 2.21.132.216:80 r10.o.lencr.org tcp
US 8.8.8.8:53 datingmart.me udp
US 8.8.8.8:53 www.hhiuew33.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 www.microsoft.com udp
AT 2.17.245.133:80 www.microsoft.com tcp
FI 65.108.69.168:13293 tcp
FI 65.108.69.168:13293 tcp
FI 65.108.69.168:13293 tcp

Files

\Users\Admin\AppData\Local\Temp\7zSCA967847\setup_install.exe

MD5 cd66b43b6558d0e17a0e92fd7ac42787
SHA1 90aedefa4b7082676d02568eb31012e40d1d6655
SHA256 ea8907747931024f386f148247b5cf0c1fff53df0d61ab6a1d85c84809511aab
SHA512 5f5848a056eaab118bf2a80fdf5fc0b6262654c9564a955f9e956ed89c102c610346e1d8de75a4b1840166062fe3299b70c049c8f6d25109cc073a91288a0b8b

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

memory/2840-52-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

\Users\Admin\AppData\Local\Temp\7zSCA967847\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

memory/2840-57-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2840-59-0x000000006FE40000-0x000000006FFC6000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zSCA967847\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

memory/2840-65-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2840-64-0x0000000064941000-0x000000006494F000-memory.dmp

memory/2840-66-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2840-67-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2840-75-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2840-74-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2840-73-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2840-72-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2840-71-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2840-70-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2840-69-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2840-68-0x000000006B440000-0x000000006B4CF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0337242833e.exe

MD5 d1ec05df172b32843f1564bc34feef68
SHA1 29ae8b1a96f294b2f420c7710c81740e79eb2b91
SHA256 e7bfb6e1cba02dd07c20e937a535193f25e87194be8fa6f949a967dc7bd919cf
SHA512 500e55b9976837acf11c97021361f7a57c7425f25e95aab20f5d83fe5c8d582de7bcae0b500cbaf85da52fc739aaaef7a3bd5f8d8b500820b83a0bbd286d26fb

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon034a40f4c2.exe

MD5 99918fe3d5011f5e084492e0d9701779
SHA1 55f7a03c6380bb9f51793be0774681b473e07c9f
SHA256 558a67043fbcd0bc37d34c99ff16f66b259b24b44811516ceff678964ec655c4
SHA512 682f1c6c648319c974e608defa41b714d0e8c3670d3f5e669b7227aaf5400285f9f0c6c5c82c50518031d8a93a3cfd591031651068d5a458a6606f2bf51d3e12

\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03184374b6827dae2.exe

MD5 7df1d7d115da507238cf409fa1bd0b91
SHA1 a133c62a14f3871c552a0bcad87a291d5744c2cf
SHA256 2bed8e9c8a557e04ab5f5c3b2a4a26133f62993277dbf0fa0ab574eabb4eddd0
SHA512 2ab249240a4c76d65a225787f2207f38a08cd3e2756bf23c2446343a583fb32a51b5e5674c3af2100a55e53ab49167c462061f251d19e3f89c23526d752c688a

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036bb55bb30d.exe

MD5 aa75aa3f07c593b1cd7441f7d8723e14
SHA1 f8e9190ccb6b36474c63ed65a74629ad490f2620
SHA256 af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1
SHA512 b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03ff1e89e18831.exe

MD5 74e88352f861cb12890a36f1e475b4af
SHA1 7dd54ab35260f277b8dcafb556dd66f4667c22d1
SHA256 64578ffca840ebc3f791f1faa21252941d9fd384622d54a28226659ad05650a3
SHA512 18a6911b0d86088d265f49471c52d901a39d1549f9ac36681946a1b91fdb2f71f162ddf4b4659be061302fae6d616852d44c9a151f66eb53bbcc2fde6e7b9463

\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0376e7a8f67a.exe

MD5 a3ba569405d0fa3f577e9c83b6c303af
SHA1 2ba0d6724aa30dc474ee00a06573e8652a117eac
SHA256 2799a1a7d1a6d1e1dc2746bea858c4052cab03833b069beac261a9f4ad56be90
SHA512 f23907f89db9e9bc6ce80faf1577a461de9ddd23009069a3ab4ab8bc18f610a6c5b44bac5469145fdc61ba130755c02baf83783d7a31d0de747d1b11f260ad0d

\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0333ecac229eb22.exe

MD5 b6f7de71dcc4573e5e5588d6876311fc
SHA1 645b41e6ea119615db745dd8e776672a4ba59c57
SHA256 73437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad
SHA512 ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42

\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon0318a4864788e065.exe

MD5 47e1245ae15e44e2df28280d95ad2741
SHA1 cb5abc70156154368ff10271fa1c1e80dab6d417
SHA256 c614c4dfbc4fd75a9ccd3ed8b14440de34a7c1945ccf865a414e2e3111162696
SHA512 032df7df40c06266c25a25a2efd945bfd7591dc442b3f4183163491f432f1be8ce2b0554067c3fe02361aeb962bd53d20878db3bec495a52c13787b31dceadeb

memory/3020-122-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon036f89e9eef8271.exe

MD5 f85794c2bf341a1efe78cdad0b1b4dc5
SHA1 d7ff2be2dafed282b5eda883ee7d02a4eca75194
SHA256 6455d5f4eae530ace507b2ac338777b408e99094acf96bbef7603d7af641b833
SHA512 91f98cff29225a025114013a9ce7423a3e5646725a927606f66577724a691b367004ca8d36ce51f129243a6a87003abd8dd09fa7b195e8ecf70fbc73305f7790

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03c16839a9b.exe

MD5 8427ae0ce0ded0794b9e0b3dd422702e
SHA1 6e5350072840eb80a09e2c28ce22c2bca8e2aab1
SHA256 8ca5df6f0a4bbc6ae6a0f56b5b2c72e253c4cc72c40919d8984039de8f45e41a
SHA512 90cb046d28eb7e956f99e024a89c05a14cae99580122d99fe49872b36c8f8de95331dd4fee60458b118f96ab40baf770c3f07dbcef2b4b6530832fcb00feac78

C:\Users\Admin\AppData\Local\Temp\7zSCA967847\Mon03f186a0d10.exe

MD5 28a0b3751b521af221baa3a76f32c8c1
SHA1 f71aaa12ac600549120b062cbbd852b1a1807c43
SHA256 710ceb98e12443d28a9fd280b453eade11bc3483f6280dc224eb48ed327028ca
SHA512 a3773694f59a8f4c7cd06f7dc97c41bf943cf2e9b6283027964890f0122e26c9822e6b91b3ac23eacefa6954b0b983e7dd9226bfb37682f1645f8c85b24fda4f

memory/1728-134-0x00000000021A0000-0x000000000227E000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FRICIDETTD2XVYUH1E3W.temp

MD5 f99a4be53f396775e388749092c697c3
SHA1 466cd7dcb77355a3974ba0691e50800ca186ed22
SHA256 92e4c082367dbc7824c4cb05a0704fb92518ee53407402792123e7caee2758da
SHA512 cb865a765838d5090955ad2de08fc53a6a1f42ac606131b2f5593413617d2de1151d0f9c03cac823b5a65d8da74cd8dc527a3d299b67d7112a069414b3e6cd8a

memory/1728-135-0x00000000021A0000-0x000000000227E000-memory.dmp

memory/1812-136-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/3020-152-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1956-151-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/2256-149-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-CO5R1.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

C:\Users\Admin\AppData\Local\Temp\is-CO5R1.tmp\idp.dll

MD5 b37377d34c8262a90ff95a9a92b65ed8
SHA1 faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256 e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA512 69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

C:\Users\Admin\AppData\Local\Temp\is-LU158.tmp\Mon034a40f4c2.tmp

MD5 9303156631ee2436db23827e27337be4
SHA1 018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256 bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA512 9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

memory/2332-164-0x0000000000A10000-0x0000000000A9A000-memory.dmp

memory/2840-165-0x0000000064940000-0x0000000064959000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 7165e9d7456520d1f1644aa26da7c423
SHA1 177f9116229a021e24f80c4059999c4c52f9e830
SHA256 40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
SHA512 fe80996a7f5c64815c19db1fa582581aa1934ea8d1050e686b4f65bcdd000df1decdf711e0e4b1de8a2aa4fcb1ac95cebb0316017c42e80d8386bd3400fcaecb

memory/1748-170-0x0000000000400000-0x000000000047C000-memory.dmp

memory/2840-179-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2840-178-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/2840-177-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2840-176-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2840-174-0x0000000000400000-0x000000000051C000-memory.dmp

memory/2400-183-0x0000000000040000-0x0000000000098000-memory.dmp

memory/2796-196-0x0000000002400000-0x0000000003400000-memory.dmp

memory/2400-200-0x0000000000220000-0x0000000000226000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Cab9869.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

memory/436-211-0x0000000000400000-0x00000000004D3000-memory.dmp

memory/1140-212-0x0000000000400000-0x000000000053F000-memory.dmp

memory/2400-213-0x0000000000360000-0x00000000003A6000-memory.dmp

memory/2400-228-0x0000000000230000-0x0000000000236000-memory.dmp

memory/2840-226-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2840-225-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2840-221-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/2840-217-0x0000000000400000-0x000000000051C000-memory.dmp

memory/2840-224-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2840-223-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1812-229-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/2796-230-0x000000002CED0000-0x000000002CF81000-memory.dmp

memory/2796-231-0x00000000002B0000-0x000000000034C000-memory.dmp

memory/2256-232-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2796-235-0x00000000002B0000-0x000000000034C000-memory.dmp

memory/2796-233-0x00000000002B0000-0x000000000034C000-memory.dmp

memory/2796-236-0x00000000002B0000-0x000000000034C000-memory.dmp

memory/592-237-0x0000000002500000-0x0000000003500000-memory.dmp

memory/1296-238-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/1812-244-0x0000000000230000-0x000000000023D000-memory.dmp

memory/1812-243-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/2796-245-0x0000000002400000-0x0000000003400000-memory.dmp

memory/956-257-0x0000000000400000-0x0000000000420000-memory.dmp

memory/956-256-0x0000000000400000-0x0000000000420000-memory.dmp

memory/956-255-0x0000000000400000-0x0000000000420000-memory.dmp

memory/956-250-0x0000000000400000-0x0000000000420000-memory.dmp

memory/956-248-0x0000000000400000-0x0000000000420000-memory.dmp

memory/956-254-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/956-252-0x0000000000400000-0x0000000000420000-memory.dmp

memory/956-246-0x0000000000400000-0x0000000000420000-memory.dmp

memory/592-260-0x000000002DB30000-0x000000002DBE1000-memory.dmp

memory/592-261-0x0000000000290000-0x000000000032C000-memory.dmp

memory/592-264-0x0000000000290000-0x000000000032C000-memory.dmp

memory/592-262-0x0000000000290000-0x000000000032C000-memory.dmp

memory/592-265-0x0000000000290000-0x000000000032C000-memory.dmp

memory/592-266-0x0000000002500000-0x0000000003500000-memory.dmp