Malware Analysis Report

2025-01-02 06:00

Sample ID 241123-tvlnlaxngx
Target e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe
SHA256 e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5
Tags
fabookie nullmixer redline socelars vidar 915 media25pqs aspackv2 discovery dropper execution infostealer spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5

Threat Level: Known bad

The file e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe was found to be: Known bad.

Malicious Activity Summary

fabookie nullmixer redline socelars vidar 915 media25pqs aspackv2 discovery dropper execution infostealer spyware stealer

NullMixer

Fabookie family

Socelars

Nullmixer family

Detect Fabookie payload

Socelars family

RedLine

Vidar

Fabookie

Redline family

Socelars payload

Vidar family

RedLine payload

NirSoft WebBrowserPassView

Detected Nirsoft tools

Vidar Stealer

Command and Scripting Interpreter: PowerShell

Blocklisted process makes network request

Checks computer location settings

Reads user/profile data of web browsers

Loads dropped DLL

ASPack v2.12-2.42

Executes dropped EXE

Checks installed software on the system

Drops Chrome extension

Looks up external IP address via web service

Looks up geolocation information via web service

Legitimate hosting services abused for malware hosting/C2

Suspicious use of SetThreadContext

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Program crash

Unsigned PE

Browser Information Discovery

Modifies system certificate store

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Modifies registry class

Modifies data under HKEY_USERS

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

Checks SCSI registry key(s)

Suspicious use of AdjustPrivilegeToken

Kills process with taskkill

Enumerates system info in registry

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-23 16:22

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-23 16:22

Reported

2024-11-23 16:25

Platform

win7-20241010-en

Max time kernel

84s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

Fabookie family

fabookie

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0337242833e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0337242833e.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0376e7a8f67a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0376e7a8f67a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036f89e9eef8271.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036f89e9eef8271.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0318a4864788e065.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0318a4864788e065.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036bb55bb30d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036bb55bb30d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-BPH16.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-BPH16.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-BPH16.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-BPH16.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Looks up geolocation information via web service

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1740 set thread context of 2020 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0337242833e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036f89e9eef8271.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0376e7a8f67a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-BPH16.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0318a4864788e065.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-NNJCG.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036bb55bb30d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036f89e9eef8271.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036f89e9eef8271.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-NNJCG.tmp\Mon034a40f4c2.tmp N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03c16839a9b.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2328 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe
PID 2328 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe
PID 2328 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe
PID 2328 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe
PID 2328 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe
PID 2328 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe
PID 2328 wrote to memory of 2904 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe
PID 2904 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2632 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2676 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2676 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2676 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2676 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2676 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2676 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2676 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2632 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2632 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2632 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2632 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2632 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2632 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2632 wrote to memory of 2672 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2904 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2464 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2904 wrote to memory of 2088 N/A C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe"

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03f186a0d10.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0337242833e.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon034a40f4c2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03184374b6827dae2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0333ecac229eb22.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03ff1e89e18831.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036f89e9eef8271.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0376e7a8f67a.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0318a4864788e065.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03c16839a9b.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036bb55bb30d.exe /mixtwo

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0337242833e.exe

Mon0337242833e.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe

Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03c16839a9b.exe

Mon03c16839a9b.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0376e7a8f67a.exe

Mon0376e7a8f67a.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03ff1e89e18831.exe

Mon03ff1e89e18831.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe

Mon0333ecac229eb22.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036f89e9eef8271.exe

Mon036f89e9eef8271.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe

"C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe" -u

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0318a4864788e065.exe

Mon0318a4864788e065.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe

Mon03f186a0d10.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe

Mon034a40f4c2.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036bb55bb30d.exe

Mon036bb55bb30d.exe /mixtwo

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 268

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\is-BPH16.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-BPH16.tmp\Mon034a40f4c2.tmp" /SL5="$50176,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe"

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe

"C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe" /SILENT

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 456

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 276

C:\Users\Admin\AppData\Local\Temp\is-NNJCG.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-NNJCG.tmp\Mon034a40f4c2.tmp" /SL5="$60176,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe" /SILENT

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2720 -s 1032

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2972 -s 504

Network

Country Destination Domain Proto
US 8.8.8.8:53 hornygl.xyz udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 www.listincode.com udp
US 8.8.8.8:53 iplogger.org udp
US 8.8.8.8:53 mstdn.social udp
DE 49.13.236.103:443 mstdn.social tcp
US 172.67.74.161:443 iplogger.org tcp
DE 49.13.236.103:443 mstdn.social tcp
DE 49.13.236.103:443 mstdn.social tcp
DE 49.13.236.103:443 mstdn.social tcp
US 8.8.8.8:53 qoto.org udp
US 100.24.65.138:443 qoto.org tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.200.3:80 c.pki.goog tcp
US 8.8.8.8:53 bthuu.com udp
US 8.8.8.8:53 r10.o.lencr.org udp
GB 72.247.176.16:80 r10.o.lencr.org tcp
US 8.8.8.8:53 datingmart.me udp
US 8.8.8.8:53 www.hhiuew33.com udp
N/A 127.0.0.1:49287 tcp
N/A 127.0.0.1:49292 tcp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 www.microsoft.com udp
AT 2.17.245.133:80 www.microsoft.com tcp
FI 65.108.69.168:13293 tcp
FI 65.108.69.168:13293 tcp
FI 65.108.69.168:13293 tcp
FI 65.108.69.168:13293 tcp
DE 49.13.236.103:443 mstdn.social tcp
DE 49.13.236.103:443 mstdn.social tcp
DE 49.13.236.103:443 mstdn.social tcp
DE 49.13.236.103:443 mstdn.social tcp
US 100.24.65.138:443 qoto.org tcp

Files

\Users\Admin\AppData\Local\Temp\7zS81975BF6\setup_install.exe

MD5 cd66b43b6558d0e17a0e92fd7ac42787
SHA1 90aedefa4b7082676d02568eb31012e40d1d6655
SHA256 ea8907747931024f386f148247b5cf0c1fff53df0d61ab6a1d85c84809511aab
SHA512 5f5848a056eaab118bf2a80fdf5fc0b6262654c9564a955f9e956ed89c102c610346e1d8de75a4b1840166062fe3299b70c049c8f6d25109cc073a91288a0b8b

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

memory/2904-56-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2904-52-0x000000006B280000-0x000000006B2A6000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zS81975BF6\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

\Users\Admin\AppData\Local\Temp\7zS81975BF6\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

memory/2904-63-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2904-68-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2904-75-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2904-71-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2904-74-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2904-73-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2904-72-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2904-70-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2904-69-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2904-67-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2904-66-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2904-65-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2904-64-0x0000000064941000-0x000000006494F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0337242833e.exe

MD5 d1ec05df172b32843f1564bc34feef68
SHA1 29ae8b1a96f294b2f420c7710c81740e79eb2b91
SHA256 e7bfb6e1cba02dd07c20e937a535193f25e87194be8fa6f949a967dc7bd919cf
SHA512 500e55b9976837acf11c97021361f7a57c7425f25e95aab20f5d83fe5c8d582de7bcae0b500cbaf85da52fc739aaaef7a3bd5f8d8b500820b83a0bbd286d26fb

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03f186a0d10.exe

MD5 28a0b3751b521af221baa3a76f32c8c1
SHA1 f71aaa12ac600549120b062cbbd852b1a1807c43
SHA256 710ceb98e12443d28a9fd280b453eade11bc3483f6280dc224eb48ed327028ca
SHA512 a3773694f59a8f4c7cd06f7dc97c41bf943cf2e9b6283027964890f0122e26c9822e6b91b3ac23eacefa6954b0b983e7dd9226bfb37682f1645f8c85b24fda4f

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0376e7a8f67a.exe

MD5 a3ba569405d0fa3f577e9c83b6c303af
SHA1 2ba0d6724aa30dc474ee00a06573e8652a117eac
SHA256 2799a1a7d1a6d1e1dc2746bea858c4052cab03833b069beac261a9f4ad56be90
SHA512 f23907f89db9e9bc6ce80faf1577a461de9ddd23009069a3ab4ab8bc18f610a6c5b44bac5469145fdc61ba130755c02baf83783d7a31d0de747d1b11f260ad0d

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03ff1e89e18831.exe

MD5 74e88352f861cb12890a36f1e475b4af
SHA1 7dd54ab35260f277b8dcafb556dd66f4667c22d1
SHA256 64578ffca840ebc3f791f1faa21252941d9fd384622d54a28226659ad05650a3
SHA512 18a6911b0d86088d265f49471c52d901a39d1549f9ac36681946a1b91fdb2f71f162ddf4b4659be061302fae6d616852d44c9a151f66eb53bbcc2fde6e7b9463

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03c16839a9b.exe

MD5 8427ae0ce0ded0794b9e0b3dd422702e
SHA1 6e5350072840eb80a09e2c28ce22c2bca8e2aab1
SHA256 8ca5df6f0a4bbc6ae6a0f56b5b2c72e253c4cc72c40919d8984039de8f45e41a
SHA512 90cb046d28eb7e956f99e024a89c05a14cae99580122d99fe49872b36c8f8de95331dd4fee60458b118f96ab40baf770c3f07dbcef2b4b6530832fcb00feac78

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon03184374b6827dae2.exe

MD5 7df1d7d115da507238cf409fa1bd0b91
SHA1 a133c62a14f3871c552a0bcad87a291d5744c2cf
SHA256 2bed8e9c8a557e04ab5f5c3b2a4a26133f62993277dbf0fa0ab574eabb4eddd0
SHA512 2ab249240a4c76d65a225787f2207f38a08cd3e2756bf23c2446343a583fb32a51b5e5674c3af2100a55e53ab49167c462061f251d19e3f89c23526d752c688a

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0318a4864788e065.exe

MD5 47e1245ae15e44e2df28280d95ad2741
SHA1 cb5abc70156154368ff10271fa1c1e80dab6d417
SHA256 c614c4dfbc4fd75a9ccd3ed8b14440de34a7c1945ccf865a414e2e3111162696
SHA512 032df7df40c06266c25a25a2efd945bfd7591dc442b3f4183163491f432f1be8ce2b0554067c3fe02361aeb962bd53d20878db3bec495a52c13787b31dceadeb

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036f89e9eef8271.exe

MD5 f85794c2bf341a1efe78cdad0b1b4dc5
SHA1 d7ff2be2dafed282b5eda883ee7d02a4eca75194
SHA256 6455d5f4eae530ace507b2ac338777b408e99094acf96bbef7603d7af641b833
SHA512 91f98cff29225a025114013a9ce7423a3e5646725a927606f66577724a691b367004ca8d36ce51f129243a6a87003abd8dd09fa7b195e8ecf70fbc73305f7790

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon0333ecac229eb22.exe

MD5 b6f7de71dcc4573e5e5588d6876311fc
SHA1 645b41e6ea119615db745dd8e776672a4ba59c57
SHA256 73437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad
SHA512 ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon036bb55bb30d.exe

MD5 aa75aa3f07c593b1cd7441f7d8723e14
SHA1 f8e9190ccb6b36474c63ed65a74629ad490f2620
SHA256 af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1
SHA512 b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b

C:\Users\Admin\AppData\Local\Temp\7zS81975BF6\Mon034a40f4c2.exe

MD5 99918fe3d5011f5e084492e0d9701779
SHA1 55f7a03c6380bb9f51793be0774681b473e07c9f
SHA256 558a67043fbcd0bc37d34c99ff16f66b259b24b44811516ceff678964ec655c4
SHA512 682f1c6c648319c974e608defa41b714d0e8c3670d3f5e669b7227aaf5400285f9f0c6c5c82c50518031d8a93a3cfd591031651068d5a458a6606f2bf51d3e12

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

MD5 15402edce035b8d8db179c92dcbb53c2
SHA1 8d9d87ca3bcaa921be82d9c38e16c4659c1d07f3
SHA256 28ebecdfcb020b5f9be0a3e9fe726d91bf7bbb2ba2d5ab18f753bfc8474a0612
SHA512 059e9d6923e44f8d99b0839df68659ca9de2dbe55792a995dda82462c73484cf980439e69f951e31b918901ece47c2205cb8799340023c65233ccdcccd9ba1bc

memory/1936-125-0x0000000002120000-0x00000000021FE000-memory.dmp

memory/1936-126-0x0000000002120000-0x00000000021FE000-memory.dmp

memory/2344-127-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/1972-132-0x0000000000400000-0x0000000000414000-memory.dmp

memory/828-150-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1972-149-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1740-153-0x0000000001190000-0x000000000121A000-memory.dmp

memory/968-148-0x0000000000400000-0x00000000004BD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-NNJCG.tmp\Mon034a40f4c2.tmp

MD5 9303156631ee2436db23827e27337be4
SHA1 018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256 bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA512 9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

C:\Users\Admin\AppData\Local\Temp\is-DLS22.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

C:\Users\Admin\AppData\Local\Temp\is-DLS22.tmp\idp.dll

MD5 b37377d34c8262a90ff95a9a92b65ed8
SHA1 faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256 e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA512 69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

memory/2720-165-0x0000000000C10000-0x0000000000C68000-memory.dmp

memory/2904-166-0x0000000000400000-0x000000000051C000-memory.dmp

memory/2904-168-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2904-169-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2904-167-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2904-171-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2904-170-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/2904-175-0x0000000000400000-0x000000000051C000-memory.dmp

memory/2904-179-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/2904-185-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2904-184-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2720-183-0x0000000000140000-0x0000000000146000-memory.dmp

memory/2904-182-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2904-181-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1936-190-0x0000000002120000-0x00000000021FE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 7165e9d7456520d1f1644aa26da7c423
SHA1 177f9116229a021e24f80c4059999c4c52f9e830
SHA256 40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
SHA512 fe80996a7f5c64815c19db1fa582581aa1934ea8d1050e686b4f65bcdd000df1decdf711e0e4b1de8a2aa4fcb1ac95cebb0316017c42e80d8386bd3400fcaecb

memory/868-191-0x0000000000400000-0x000000000047C000-memory.dmp

memory/2720-193-0x00000000005D0000-0x0000000000616000-memory.dmp

memory/2720-197-0x0000000000160000-0x0000000000166000-memory.dmp

memory/1516-198-0x0000000002240000-0x0000000003240000-memory.dmp

memory/1936-212-0x0000000002120000-0x00000000021FE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Cab19F6.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

memory/2344-227-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/2300-226-0x0000000000400000-0x000000000053F000-memory.dmp

memory/1516-228-0x000000002DB30000-0x000000002DBE1000-memory.dmp

memory/1516-229-0x0000000000820000-0x00000000008BC000-memory.dmp

memory/2344-230-0x0000000000230000-0x000000000030E000-memory.dmp

memory/1516-233-0x0000000000820000-0x00000000008BC000-memory.dmp

memory/2384-235-0x0000000000400000-0x00000000004D3000-memory.dmp

memory/1516-236-0x0000000000820000-0x00000000008BC000-memory.dmp

memory/2344-234-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/1516-231-0x0000000000820000-0x00000000008BC000-memory.dmp

memory/2564-237-0x0000000002210000-0x0000000003210000-memory.dmp

memory/2564-241-0x000000002DA10000-0x000000002DAC1000-memory.dmp

memory/2564-242-0x0000000000390000-0x000000000042C000-memory.dmp

memory/2564-243-0x0000000000390000-0x000000000042C000-memory.dmp

memory/2564-245-0x0000000000390000-0x000000000042C000-memory.dmp

memory/2564-246-0x0000000000390000-0x000000000042C000-memory.dmp

memory/2564-248-0x0000000002210000-0x0000000003210000-memory.dmp

memory/1516-249-0x0000000002240000-0x0000000003240000-memory.dmp

memory/2416-251-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/828-250-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2020-252-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2020-256-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2020-258-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2020-254-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2020-263-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2020-262-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2020-261-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2020-260-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-23 16:22

Reported

2024-11-23 16:25

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

Fabookie family

fabookie

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0333ecac229eb22.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0337242833e.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\rundll32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\is-184SU.tmp\Mon034a40f4c2.tmp N/A
Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0376e7a8f67a.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0337242833e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-184SU.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon036f89e9eef8271.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0376e7a8f67a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0318a4864788e065.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03ff1e89e18831.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03c16839a9b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon036bb55bb30d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-694UJ.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e58bb7b.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfhgpjbcoignfibliobpclhpfnadhofn\10.59.13_0\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Looks up geolocation information via web service

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2760 set thread context of 5008 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon036bb55bb30d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-694UJ.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon036f89e9eef8271.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e58bb7b.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-184SU.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0376e7a8f67a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0318a4864788e065.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0337242833e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0318a4864788e065.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0318a4864788e065.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0318a4864788e065.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133768526017987200" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0376e7a8f67a.exe N/A
Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0337242833e.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03c16839a9b.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1428 wrote to memory of 1068 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe
PID 1428 wrote to memory of 1068 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe
PID 1428 wrote to memory of 1068 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe
PID 1068 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4480 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4480 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4480 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4480 wrote to memory of 4972 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4480 wrote to memory of 4972 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4480 wrote to memory of 4972 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2704 wrote to memory of 1700 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2704 wrote to memory of 1700 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2704 wrote to memory of 1700 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1068 wrote to memory of 1116 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 1116 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 1116 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 2324 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4744 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4744 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4744 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 5040 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 3664 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1068 wrote to memory of 3664 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1068 wrote to memory of 3664 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1068 wrote to memory of 4160 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4160 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4160 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 1564 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4832 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4832 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4832 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 4744 wrote to memory of 3464 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe
PID 4744 wrote to memory of 3464 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe
PID 4744 wrote to memory of 3464 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe
PID 1068 wrote to memory of 1812 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
PID 1068 wrote to memory of 1812 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
PID 1068 wrote to memory of 1812 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
PID 1116 wrote to memory of 4532 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe
PID 1116 wrote to memory of 4532 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe
PID 1116 wrote to memory of 4532 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe
PID 1068 wrote to memory of 3576 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 3576 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 1068 wrote to memory of 3576 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 5040 wrote to memory of 2760 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe
PID 5040 wrote to memory of 2760 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe
PID 5040 wrote to memory of 2760 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe
PID 2324 wrote to memory of 3584 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0337242833e.exe
PID 2324 wrote to memory of 3584 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0337242833e.exe
PID 2324 wrote to memory of 3584 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0337242833e.exe
PID 3464 wrote to memory of 4820 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe C:\Users\Admin\AppData\Local\Temp\is-184SU.tmp\Mon034a40f4c2.tmp
PID 3464 wrote to memory of 4820 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe C:\Users\Admin\AppData\Local\Temp\is-184SU.tmp\Mon034a40f4c2.tmp
PID 3464 wrote to memory of 4820 N/A C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe C:\Users\Admin\AppData\Local\Temp\is-184SU.tmp\Mon034a40f4c2.tmp
PID 3664 wrote to memory of 2424 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\control.exe

Processes

C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5.exe"

C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03f186a0d10.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0337242833e.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon034a40f4c2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03184374b6827dae2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0333ecac229eb22.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03ff1e89e18831.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036f89e9eef8271.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0376e7a8f67a.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0318a4864788e065.exe

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe

Mon034a40f4c2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03c16839a9b.exe

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe

Mon03f186a0d10.exe

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0337242833e.exe

Mon0337242833e.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036bb55bb30d.exe /mixtwo

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe

Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0333ecac229eb22.exe

Mon0333ecac229eb22.exe

C:\Users\Admin\AppData\Local\Temp\is-184SU.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-184SU.tmp\Mon034a40f4c2.tmp" /SL5="$40114,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe"

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon036f89e9eef8271.exe

Mon036f89e9eef8271.exe

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0376e7a8f67a.exe

Mon0376e7a8f67a.exe

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0318a4864788e065.exe

Mon0318a4864788e065.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1068 -ip 1068

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03ff1e89e18831.exe

Mon03ff1e89e18831.exe

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03c16839a9b.exe

Mon03c16839a9b.exe

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon036bb55bb30d.exe

Mon036bb55bb30d.exe /mixtwo

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe

"C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe" /SILENT

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 588

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3204 -ip 3204

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0333ecac229eb22.exe

"C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0333ecac229eb22.exe" -u

C:\Users\Admin\AppData\Local\Temp\is-694UJ.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-694UJ.tmp\Mon034a40f4c2.tmp" /SL5="$80286,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe" /SILENT

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4180 -ip 4180

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 408

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 356

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe71fecc40,0x7ffe71fecc4c,0x7ffe71fecc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,13918900502887585852,192262293031031692,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1928 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,13918900502887585852,192262293031031692,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,13918900502887585852,192262293031031692,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2480 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,13918900502887585852,192262293031031692,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3156 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2220,i,13918900502887585852,192262293031031692,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,13918900502887585852,192262293031031692,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4376,i,13918900502887585852,192262293031031692,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4828 /prefetch:8

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4756,i,13918900502887585852,192262293031031692,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc

C:\Users\Admin\AppData\Local\Temp\e58bb7b.exe

"C:\Users\Admin\AppData\Local\Temp\e58bb7b.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2908 -ip 2908

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 780

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4872,i,13918900502887585852,192262293031031692,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 hornygl.xyz udp
US 8.8.8.8:53 www.listincode.com udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.3.46:443 iplogger.org tcp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 46.3.26.104.in-addr.arpa udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 datingmart.me udp
GB 142.250.200.3:80 c.pki.goog tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 3.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 bthuu.com udp
US 8.8.8.8:53 mstdn.social udp
FI 65.108.69.168:13293 tcp
DE 49.13.236.103:443 mstdn.social tcp
US 8.8.8.8:53 103.236.13.49.in-addr.arpa udp
US 8.8.8.8:53 r11.o.lencr.org udp
GB 72.247.176.59:80 r11.o.lencr.org tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 155.245.17.2.in-addr.arpa udp
US 8.8.8.8:53 59.176.247.72.in-addr.arpa udp
US 8.8.8.8:53 qoto.org udp
US 100.24.65.138:443 qoto.org tcp
US 8.8.8.8:53 r10.o.lencr.org udp
GB 72.247.176.16:80 r10.o.lencr.org tcp
US 8.8.8.8:53 138.65.24.100.in-addr.arpa udp
US 8.8.8.8:53 16.176.247.72.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 www.google.com udp
GB 172.217.16.228:443 www.google.com tcp
GB 172.217.16.228:443 www.google.com tcp
GB 172.217.16.228:443 www.google.com tcp
US 8.8.8.8:53 42.200.250.142.in-addr.arpa udp
GB 172.217.16.228:443 www.google.com udp
US 8.8.8.8:53 228.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 www.hhiuew33.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
N/A 127.0.0.1:56359 tcp
N/A 127.0.0.1:56361 tcp
US 8.8.8.8:53 clients2.google.com udp
GB 142.250.178.14:443 clients2.google.com tcp
US 8.8.8.8:53 14.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 99.209.201.84.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FR 77.233.110.97:8080 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
DE 49.13.236.103:443 mstdn.social tcp
US 100.24.65.138:443 qoto.org tcp
US 8.8.8.8:53 beacons.gcp.gvt2.com udp
GB 172.217.16.227:443 beacons.gcp.gvt2.com tcp
US 8.8.8.8:53 227.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp

Files

C:\Users\Admin\AppData\Local\Temp\7zS49515997\setup_install.exe

MD5 cd66b43b6558d0e17a0e92fd7ac42787
SHA1 90aedefa4b7082676d02568eb31012e40d1d6655
SHA256 ea8907747931024f386f148247b5cf0c1fff53df0d61ab6a1d85c84809511aab
SHA512 5f5848a056eaab118bf2a80fdf5fc0b6262654c9564a955f9e956ed89c102c610346e1d8de75a4b1840166062fe3299b70c049c8f6d25109cc073a91288a0b8b

C:\Users\Admin\AppData\Local\Temp\7zS49515997\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

C:\Users\Admin\AppData\Local\Temp\7zS49515997\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

C:\Users\Admin\AppData\Local\Temp\7zS49515997\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

memory/1068-58-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1068-57-0x0000000064940000-0x0000000064959000-memory.dmp

memory/1068-56-0x0000000064941000-0x000000006494F000-memory.dmp

memory/1068-55-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1068-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1068-67-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1068-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1068-64-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1700-68-0x000000007306E000-0x000000007306F000-memory.dmp

memory/4972-69-0x0000000073060000-0x0000000073810000-memory.dmp

memory/4972-70-0x0000000004F20000-0x0000000004F56000-memory.dmp

memory/4972-75-0x0000000073060000-0x0000000073810000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03184374b6827dae2.exe

MD5 7df1d7d115da507238cf409fa1bd0b91
SHA1 a133c62a14f3871c552a0bcad87a291d5744c2cf
SHA256 2bed8e9c8a557e04ab5f5c3b2a4a26133f62993277dbf0fa0ab574eabb4eddd0
SHA512 2ab249240a4c76d65a225787f2207f38a08cd3e2756bf23c2446343a583fb32a51b5e5674c3af2100a55e53ab49167c462061f251d19e3f89c23526d752c688a

memory/1700-74-0x0000000005040000-0x0000000005668000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03ff1e89e18831.exe

MD5 74e88352f861cb12890a36f1e475b4af
SHA1 7dd54ab35260f277b8dcafb556dd66f4667c22d1
SHA256 64578ffca840ebc3f791f1faa21252941d9fd384622d54a28226659ad05650a3
SHA512 18a6911b0d86088d265f49471c52d901a39d1549f9ac36681946a1b91fdb2f71f162ddf4b4659be061302fae6d616852d44c9a151f66eb53bbcc2fde6e7b9463

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0376e7a8f67a.exe

MD5 a3ba569405d0fa3f577e9c83b6c303af
SHA1 2ba0d6724aa30dc474ee00a06573e8652a117eac
SHA256 2799a1a7d1a6d1e1dc2746bea858c4052cab03833b069beac261a9f4ad56be90
SHA512 f23907f89db9e9bc6ce80faf1577a461de9ddd23009069a3ab4ab8bc18f610a6c5b44bac5469145fdc61ba130755c02baf83783d7a31d0de747d1b11f260ad0d

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon036f89e9eef8271.exe

MD5 f85794c2bf341a1efe78cdad0b1b4dc5
SHA1 d7ff2be2dafed282b5eda883ee7d02a4eca75194
SHA256 6455d5f4eae530ace507b2ac338777b408e99094acf96bbef7603d7af641b833
SHA512 91f98cff29225a025114013a9ce7423a3e5646725a927606f66577724a691b367004ca8d36ce51f129243a6a87003abd8dd09fa7b195e8ecf70fbc73305f7790

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0333ecac229eb22.exe

MD5 b6f7de71dcc4573e5e5588d6876311fc
SHA1 645b41e6ea119615db745dd8e776672a4ba59c57
SHA256 73437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad
SHA512 ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon034a40f4c2.exe

MD5 99918fe3d5011f5e084492e0d9701779
SHA1 55f7a03c6380bb9f51793be0774681b473e07c9f
SHA256 558a67043fbcd0bc37d34c99ff16f66b259b24b44811516ceff678964ec655c4
SHA512 682f1c6c648319c974e608defa41b714d0e8c3670d3f5e669b7227aaf5400285f9f0c6c5c82c50518031d8a93a3cfd591031651068d5a458a6606f2bf51d3e12

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0337242833e.exe

MD5 d1ec05df172b32843f1564bc34feef68
SHA1 29ae8b1a96f294b2f420c7710c81740e79eb2b91
SHA256 e7bfb6e1cba02dd07c20e937a535193f25e87194be8fa6f949a967dc7bd919cf
SHA512 500e55b9976837acf11c97021361f7a57c7425f25e95aab20f5d83fe5c8d582de7bcae0b500cbaf85da52fc739aaaef7a3bd5f8d8b500820b83a0bbd286d26fb

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03f186a0d10.exe

MD5 28a0b3751b521af221baa3a76f32c8c1
SHA1 f71aaa12ac600549120b062cbbd852b1a1807c43
SHA256 710ceb98e12443d28a9fd280b453eade11bc3483f6280dc224eb48ed327028ca
SHA512 a3773694f59a8f4c7cd06f7dc97c41bf943cf2e9b6283027964890f0122e26c9822e6b91b3ac23eacefa6954b0b983e7dd9226bfb37682f1645f8c85b24fda4f

memory/1068-63-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1068-62-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1068-61-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1068-60-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1068-59-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1068-66-0x000000006B280000-0x000000006B2A6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS49515997\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

C:\Users\Admin\AppData\Local\Temp\7zS49515997\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

memory/1700-87-0x0000000073060000-0x0000000073810000-memory.dmp

memory/4972-90-0x0000000005DF0000-0x0000000005E56000-memory.dmp

memory/4972-97-0x0000000073060000-0x0000000073810000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon036bb55bb30d.exe

MD5 aa75aa3f07c593b1cd7441f7d8723e14
SHA1 f8e9190ccb6b36474c63ed65a74629ad490f2620
SHA256 af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1
SHA512 b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b

memory/2760-116-0x00000000003A0000-0x000000000042A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-184SU.tmp\Mon034a40f4c2.tmp

MD5 9303156631ee2436db23827e27337be4
SHA1 018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256 bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA512 9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

C:\Users\Admin\AppData\Local\Temp\is-6GTUB.tmp\idp.dll

MD5 b37377d34c8262a90ff95a9a92b65ed8
SHA1 faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256 e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA512 69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

memory/2760-134-0x0000000004AE0000-0x0000000004AFE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon03c16839a9b.exe

MD5 8427ae0ce0ded0794b9e0b3dd422702e
SHA1 6e5350072840eb80a09e2c28ce22c2bca8e2aab1
SHA256 8ca5df6f0a4bbc6ae6a0f56b5b2c72e253c4cc72c40919d8984039de8f45e41a
SHA512 90cb046d28eb7e956f99e024a89c05a14cae99580122d99fe49872b36c8f8de95331dd4fee60458b118f96ab40baf770c3f07dbcef2b4b6530832fcb00feac78

memory/2760-133-0x0000000004B00000-0x0000000004B76000-memory.dmp

memory/3204-139-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/1544-138-0x000001A20FA70000-0x000001A20FAC8000-memory.dmp

memory/1544-142-0x000001A20FE70000-0x000001A20FE76000-memory.dmp

memory/2760-141-0x0000000005360000-0x0000000005904000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS49515997\Mon0318a4864788e065.exe

MD5 47e1245ae15e44e2df28280d95ad2741
SHA1 cb5abc70156154368ff10271fa1c1e80dab6d417
SHA256 c614c4dfbc4fd75a9ccd3ed8b14440de34a7c1945ccf865a414e2e3111162696
SHA512 032df7df40c06266c25a25a2efd945bfd7591dc442b3f4183163491f432f1be8ce2b0554067c3fe02361aeb962bd53d20878db3bec495a52c13787b31dceadeb

memory/1700-114-0x0000000073060000-0x0000000073810000-memory.dmp

memory/3464-110-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1700-96-0x00000000057C0000-0x0000000005B14000-memory.dmp

memory/1700-89-0x0000000005750000-0x00000000057B6000-memory.dmp

memory/4972-86-0x0000000005D50000-0x0000000005D72000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_frnkaxu0.c0j.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4820-150-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/1544-160-0x000001A20FE80000-0x000001A20FE86000-memory.dmp

memory/4972-158-0x0000000006A50000-0x0000000006A9C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-DFF8J.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

memory/3464-157-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1700-154-0x0000000005D10000-0x0000000005D2E000-memory.dmp

memory/1544-152-0x000001A20FEA0000-0x000001A20FEE6000-memory.dmp

memory/2924-147-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5008-185-0x00000000056F0000-0x00000000057FA000-memory.dmp

memory/5008-186-0x0000000005660000-0x000000000569C000-memory.dmp

memory/5008-184-0x00000000055C0000-0x00000000055D2000-memory.dmp

memory/5008-183-0x0000000005B30000-0x0000000006148000-memory.dmp

memory/5008-182-0x0000000000400000-0x0000000000420000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Mon03184374b6827dae2.exe.log

MD5 e5352797047ad2c91b83e933b24fbc4f
SHA1 9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256 b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512 dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

memory/1068-198-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/1068-197-0x0000000064940000-0x0000000064959000-memory.dmp

memory/1068-196-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/1360-205-0x0000000000400000-0x0000000000455000-memory.dmp

memory/1700-212-0x000000006E110000-0x000000006E15C000-memory.dmp

memory/1700-222-0x0000000006F70000-0x0000000006F8E000-memory.dmp

memory/4972-223-0x000000006E110000-0x000000006E15C000-memory.dmp

memory/1700-211-0x0000000006310000-0x0000000006342000-memory.dmp

memory/4972-233-0x0000000007750000-0x00000000077F3000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 b968c57a14ddada4128356f6e39fb66c6d864d3f
SHA256 0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
SHA512 4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

memory/1068-195-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/1068-193-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/4180-189-0x0000000000400000-0x00000000004D3000-memory.dmp

memory/1068-188-0x0000000000400000-0x000000000051C000-memory.dmp

memory/3204-187-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/1700-239-0x00000000070E0000-0x00000000070FA000-memory.dmp

memory/1700-238-0x0000000007720000-0x0000000007D9A000-memory.dmp

memory/4972-237-0x0000000007E80000-0x00000000084FA000-memory.dmp

memory/4972-240-0x0000000073060000-0x0000000073810000-memory.dmp

memory/1700-241-0x0000000007160000-0x000000000716A000-memory.dmp

memory/4972-249-0x0000000007A60000-0x0000000007AF6000-memory.dmp

memory/1712-248-0x0000000002750000-0x0000000003750000-memory.dmp

memory/1700-250-0x00000000072E0000-0x00000000072F1000-memory.dmp

memory/4972-261-0x0000000073060000-0x0000000073810000-memory.dmp

memory/1700-260-0x000000007306E000-0x000000007306F000-memory.dmp

memory/4972-266-0x0000000007A20000-0x0000000007A2E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

MD5 b7161c0845a64ff6d7345b67ff97f3b0
SHA1 d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256 fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA512 98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

memory/4972-268-0x0000000007A30000-0x0000000007A44000-memory.dmp

memory/4972-271-0x0000000007B20000-0x0000000007B3A000-memory.dmp

memory/4972-273-0x0000000007B10000-0x0000000007B18000-memory.dmp

memory/1700-274-0x0000000073060000-0x0000000073810000-memory.dmp

memory/4972-275-0x0000000073060000-0x0000000073810000-memory.dmp

memory/4972-278-0x0000000073060000-0x0000000073810000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 19fbcf772c17ef1952a44f44087f2192
SHA1 4907e1e01a16cd729a6a57b071e770534a88494b
SHA256 8b35c58595dbdbc66e90cdda6eb7aa2135e57d0d2aea51fdbaa2f854d4c6b450
SHA512 375e50647e48f913a789b21d1213505f640ca1d53a6438f0b31c248c0020556201f5d521c42f0e1d5f488c674db9604f77066f6f166545a2cb152a159fa044f0

memory/1700-282-0x0000000073060000-0x0000000073810000-memory.dmp

memory/4440-283-0x0000000000400000-0x000000000053F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 7165e9d7456520d1f1644aa26da7c423
SHA1 177f9116229a021e24f80c4059999c4c52f9e830
SHA256 40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
SHA512 fe80996a7f5c64815c19db1fa582581aa1934ea8d1050e686b4f65bcdd000df1decdf711e0e4b1de8a2aa4fcb1ac95cebb0316017c42e80d8386bd3400fcaecb

memory/3428-287-0x0000000000400000-0x000000000047C000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 f58419196c169c0e4de7a6018c870fe7
SHA1 e4802d79e9e044faf7e18774285f54fb060aec18
SHA256 82748bb633ac8d60021928b42de6f82670377e9bbfc9b8ed583e893724199db2
SHA512 d5d6034fe1cb9131b5c64bfebd4d62818e06f27a1aa55dc4a44f39b5318458b680f9004690e2557168c75ce9c0ed088d81f13cd69d9f2d895225ae706353ea1f

\??\pipe\crashpad_3664_SMUCYZPNKZINRCXO

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/1712-307-0x000000002D640000-0x000000002D6F1000-memory.dmp

memory/1712-309-0x000000002D710000-0x000000002D7AC000-memory.dmp

memory/1712-312-0x000000002D710000-0x000000002D7AC000-memory.dmp

memory/1712-310-0x000000002D710000-0x000000002D7AC000-memory.dmp

memory/2924-313-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2468-314-0x0000000000400000-0x00000000004BD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

MD5 3d4c08e0305687969de78f4aee28efcf
SHA1 771f74f271f6a11682748d45bf4af001aba77bb3
SHA256 1503e9477eb640b1befe748ad5e10f04593ab144fc2cd748d0fa65d267b43fd5
SHA512 b3da9f9084a31a60213da905b4a8aacf204efeafc0b71816ef91266ab57fd8c8ee8a1119f4aedc198e220af4ecfa2b91a30cf06957cf7261354ab24a0c591476

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

memory/1712-321-0x0000000002750000-0x0000000003750000-memory.dmp

memory/1712-322-0x000000002D710000-0x000000002D7AC000-memory.dmp

memory/1712-323-0x000000002D7B0000-0x000000002E937000-memory.dmp

memory/1712-324-0x000000002E940000-0x000000002E9D6000-memory.dmp

memory/1712-337-0x000000002E9F0000-0x000000002EA80000-memory.dmp

memory/1428-340-0x0000000002A10000-0x0000000003A10000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 e05bb75da254cd4056b54b4e0c186c76
SHA1 b33bd876018b411dc9ac2e3e741c70d1d5eee94b
SHA256 54337c8f9669c860f4a34fb14b1d0548e2dcea4ebe725e318426c6f45faa7a5e
SHA512 edf918d6dd6e80ef8e3075d03d82d04daa5f22aee680388df6fb76928966835878da7bcd78c905d2247f01131242a091a17be520e8a297dae8de7612cff56a03

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 fe988ec75f38b2523a9365a1d0bf87cb
SHA1 b0876e22dd252627e7aa90556e164ed09b9269c8
SHA256 8ba08755a521c8adef2e24550cd505129d1263fabc6b7e5f023d85affa3b42de
SHA512 a0a0f38cc143f3dc35ab22f1ea8977ee8fd36d89f5c61804c5a7b167cd8369c93e49f5f76811b94ea9e61a2840d6cb2869e068326ae6481155b704c6a9a76820

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 0f8fb39ca60325da6d71ba81e03a34b2
SHA1 58761ae05ce6d5fee6158f8fcdad68c1259edb33
SHA256 b6a6ae508cf8acbc56eed6a01b0c7edb669ef8056f4eda329495571a0c16b901
SHA512 864ea82112b3069d898fb951873657ae4cb7c3b1a5364d2e877a5a34526c60c1877d87b9712e3b90ef416eae539b83348743aa162b7c0cc88951863368cfef11

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 3b53144e386004b630597766476c98b9
SHA1 4c0c7d2a2217a487a8b8424f9672bed63fb71ae3
SHA256 a32b76d82e84990955c72080ffa29ca3a6c27b8af6e160ce6a5ab47b2b37d147
SHA512 5857d957a5a675ee79cddd711f1436df084aa22675199cfc37fed73ac7dbd513684abf56e19ad5a4227c7f5bafbaf07089a76c66b6722c5678abd144a9c896a5

memory/1428-363-0x000000002D920000-0x000000002D9D1000-memory.dmp

memory/1428-364-0x000000002D9E0000-0x000000002DA7C000-memory.dmp

memory/1428-366-0x000000002D9E0000-0x000000002DA7C000-memory.dmp

memory/1428-368-0x000000002D9E0000-0x000000002DA7C000-memory.dmp

memory/1428-370-0x0000000002A10000-0x0000000003A10000-memory.dmp

memory/1428-374-0x000000002D9E0000-0x000000002DA7C000-memory.dmp

memory/1428-375-0x000000002DA80000-0x000000002EC07000-memory.dmp

memory/1428-376-0x000000002EC10000-0x000000002ECA6000-memory.dmp

memory/1428-377-0x000000002ECC0000-0x000000002ED50000-memory.dmp

memory/1428-380-0x000000002ECC0000-0x000000002ED50000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

MD5 b17d8144dfbee41450f005fd2a6cc4cd
SHA1 7234ee4fb906dbea7ab471165df7b3c66df8435b
SHA256 caf98aad55082fc7b3760273bfabcf01aa166aed8a7dcb9dfb223209a5f561c3
SHA512 39fdb4f28086786594c10760ba01836d7b09023019a7267b9b85cb989a45a6d979621674d7d82b842ddf0bac3dd3845941a9455e453a41f7ac533ada15d68ffa

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 132534da96cb4ad313bef8a3b5acdc74
SHA1 ac60bf36139a6922bc0e23caee9fb33a09ca9465
SHA256 991e352ed82648de5501df032a6f6f6d0aea7d9c7f535c7ea2fdeec0715d507d
SHA512 eae0a31478bb170a4dbd1e9fc5439140e1974665342845bc0de5cb932d8eeb05597622e874525c02ff904e964971a956b0fca9e1a5af23588c476de7d5dcd1f7

memory/1428-396-0x0000000000770000-0x0000000000773000-memory.dmp

memory/1428-397-0x0000000000780000-0x0000000000785000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 67b343ad4d5272657f2192663727cb6b
SHA1 3c3241383084d29b64a15fc5f8d9969dc3d0835b
SHA256 825e465c5bca16ee07abb44b3c669918773cbc9321f901cd9c48de1f3d6c4370
SHA512 d46f4cba597fd362a1610606401572bc08d58e3f55d19781867475dea3b8a6eb1288636a2275baa00292add69fabee8c321a5f175b70c8423b67c76713ffca3b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 1008d3e5347e796fc64c1ff69a01182f
SHA1 9fd6ceacf0f0bbb0bafb9dd1731a27871ae0f5de
SHA256 69f7ddb0c32845310304c4b9c54642757dc52e4cae2a2895a1a45fdb98f10606
SHA512 89b8a984ba5202880367467064b71c273ad22ffffad383b2fb534593ea94919501d4d2796e3fada6c3cdd184f6c2310022c8dac32f2de37766c3634b8b5dbc11

C:\Users\Admin\AppData\Local\Temp\e58bb7b.exe

MD5 620bda3df817bff8deb38758d1dc668c
SHA1 9933523941851b42047f2b7a1324eb8daa8fb1ff
SHA256 b74d7ff45768a1ee6f267e895de3e46cca505edf205563ef3f7db827f38363b3
SHA512 bc9e932860f63090bab251057bc1fd6875c410c2358321eaa74fccc117561b91e4ce6b24d5e7bb13dc44732ae151b7c33fe201acbb5af689d7f2d248dfb8c568

memory/2908-450-0x0000000000C60000-0x0000000000C68000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 cbcce2ab08ced986ccdced1aae120873
SHA1 6774ed9187213d7b431bc8742da9880647fd601c
SHA256 1f9161b381437f5abd49f2e5f76c71da393404bde65d375889963a2b1e20be3b
SHA512 acb091cfddc4ceaedd34d9dad04a53d75ba2b421a1a459a6f270e32e038f3db8aaf17cc88958b9d5be5667cc2d2c265e93854efcb747b1b00ac58fe628da0223

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 27c6a3f223356d03cac15a92b8d4eb0b
SHA1 24c5a23c3bd3ebf9a30018595c634b722af69433
SHA256 ab904dc28f8284a1b3897ac9f2d02c07d00f51b875edbdaafdfa5623943600ec
SHA512 979fdd9c2dee7e5f1f0702433e1420a842e52a79ddab9cc41b0de2ebb472eba98bd1de250e4d09176ea8c259ff5b292c14d9fd066365e62dec240e5d2145a7b0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f80a40ceb9d3c82eac29bd6b1f7f7c8f
SHA1 aa135ce70352cb0b9c3defe6331435cc4683834c
SHA256 68768cc816436f9653f0d50200ec817948cf9e1fa01f593876c32c825d516500
SHA512 13c12302a70fd1f19ca2065d53fd7caae63ee49b41ea51e127b958e8d193f655025fa399107c1d8c87bfa6dbcfeabb864aa814c6ae3da8d0b89695b4016739ec