Malware Analysis Report

2025-01-02 06:04

Sample ID 241129-p1bcla1jhm
Target e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe
SHA256 e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5
Tags
fabookie nullmixer redline socelars vidar 915 media25pqs aspackv2 discovery dropper execution infostealer spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5

Threat Level: Known bad

The file e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe was found to be: Known bad.

Malicious Activity Summary

fabookie nullmixer redline socelars vidar 915 media25pqs aspackv2 discovery dropper execution infostealer spyware stealer

Socelars

NullMixer

Nullmixer family

Fabookie

Socelars family

Vidar family

RedLine

Fabookie family

Socelars payload

RedLine payload

Detect Fabookie payload

Redline family

Vidar

Vidar Stealer

NirSoft WebBrowserPassView

Detected Nirsoft tools

Command and Scripting Interpreter: PowerShell

Command and Scripting Interpreter: PowerShell

Blocklisted process makes network request

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Reads user/profile data of web browsers

ASPack v2.12-2.42

Checks installed software on the system

Drops Chrome extension

Looks up geolocation information via web service

Looks up external IP address via web service

Legitimate hosting services abused for malware hosting/C2

Suspicious use of SetThreadContext

Program crash

System Location Discovery: System Language Discovery

Browser Information Discovery

Enumerates physical storage devices

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Modifies system certificate store

Enumerates system info in registry

Kills process with taskkill

Suspicious use of FindShellTrayWindow

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Modifies data under HKEY_USERS

Suspicious use of WriteProcessMemory

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Checks SCSI registry key(s)

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-29 12:47

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-29 12:47

Reported

2024-11-29 12:49

Platform

win7-20240903-en

Max time kernel

63s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

Fabookie family

fabookie

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0318a4864788e065.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0318a4864788e065.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036f89e9eef8271.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036f89e9eef8271.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0376e7a8f67a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0376e7a8f67a.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036bb55bb30d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036bb55bb30d.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Windows\SysWOW64\cmd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0337242833e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0337242833e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-V0LBC.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-V0LBC.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-V0LBC.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-V0LBC.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Windows\SysWOW64\WerFault.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-BP2MN.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-BP2MN.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-BP2MN.tmp\Mon034a40f4c2.tmp N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Looks up geolocation information via web service

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1904 set thread context of 2692 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0318a4864788e065.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-V0LBC.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036f89e9eef8271.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0376e7a8f67a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036bb55bb30d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-BP2MN.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0337242833e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036f89e9eef8271.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036f89e9eef8271.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03c16839a9b.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2504 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe
PID 2504 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe
PID 2504 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe
PID 2504 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe
PID 2504 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe
PID 2504 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe
PID 2504 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe
PID 2276 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2656 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2780 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2596 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2568 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2580 N/A C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe"

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03f186a0d10.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0337242833e.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon034a40f4c2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03184374b6827dae2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0333ecac229eb22.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03ff1e89e18831.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036f89e9eef8271.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0376e7a8f67a.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0318a4864788e065.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03c16839a9b.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036bb55bb30d.exe /mixtwo

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03c16839a9b.exe

Mon03c16839a9b.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe

Mon0333ecac229eb22.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0318a4864788e065.exe

Mon0318a4864788e065.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036f89e9eef8271.exe

Mon036f89e9eef8271.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe

Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe

"C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe" -u

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0376e7a8f67a.exe

Mon0376e7a8f67a.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe

Mon034a40f4c2.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036bb55bb30d.exe

Mon036bb55bb30d.exe /mixtwo

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe

Mon03f186a0d10.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0337242833e.exe

Mon0337242833e.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03ff1e89e18831.exe

Mon03ff1e89e18831.exe

C:\Users\Admin\AppData\Local\Temp\is-V0LBC.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-V0LBC.tmp\Mon034a40f4c2.tmp" /SL5="$40206,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 264

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 272

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe

"C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe" /SILENT

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\is-BP2MN.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-BP2MN.tmp\Mon034a40f4c2.tmp" /SL5="$70158,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe" /SILENT

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 456

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 672 -s 1032

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2884 -s 492

C:\Users\Admin\AppData\Local\Temp\f77d2e9.exe

"C:\Users\Admin\AppData\Local\Temp\f77d2e9.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 652

Network

Country Destination Domain Proto
US 8.8.8.8:53 hornygl.xyz udp
US 8.8.8.8:53 gp.gamebuy768.com udp
N/A 127.0.0.1:49271 tcp
N/A 127.0.0.1:49274 tcp
US 8.8.8.8:53 www.listincode.com udp
US 8.8.8.8:53 iplogger.org udp
US 172.67.74.161:443 iplogger.org tcp
US 8.8.8.8:53 bthuu.com udp
US 8.8.8.8:53 c.pki.goog udp
US 8.8.8.8:53 ip-api.com udp
GB 142.250.200.3:80 c.pki.goog tcp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 datingmart.me udp
US 8.8.8.8:53 mstdn.social udp
DE 49.13.236.103:443 mstdn.social tcp
DE 49.13.236.103:443 mstdn.social tcp
DE 49.13.236.103:443 mstdn.social tcp
DE 49.13.236.103:443 mstdn.social tcp
US 8.8.8.8:53 qoto.org udp
US 100.24.65.138:443 qoto.org tcp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 r10.o.lencr.org udp
GB 2.22.144.149:80 r10.o.lencr.org tcp
US 8.8.8.8:53 www.hhiuew33.com udp
FR 77.233.110.97:8080 tcp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 crl.microsoft.com udp
GB 88.221.134.146:80 crl.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
GB 184.25.193.234:80 www.microsoft.com tcp
FR 77.233.110.97:8080 tcp
FI 65.108.69.168:13293 tcp
FI 65.108.69.168:13293 tcp
FI 65.108.69.168:13293 tcp

Files

\Users\Admin\AppData\Local\Temp\7zS8C90AE86\setup_install.exe

MD5 cd66b43b6558d0e17a0e92fd7ac42787
SHA1 90aedefa4b7082676d02568eb31012e40d1d6655
SHA256 ea8907747931024f386f148247b5cf0c1fff53df0d61ab6a1d85c84809511aab
SHA512 5f5848a056eaab118bf2a80fdf5fc0b6262654c9564a955f9e956ed89c102c610346e1d8de75a4b1840166062fe3299b70c049c8f6d25109cc073a91288a0b8b

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

memory/2276-52-0x000000006B280000-0x000000006B2A6000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zS8C90AE86\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

memory/2276-55-0x000000006B440000-0x000000006B4CF000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zS8C90AE86\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

memory/2276-65-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2276-68-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2276-64-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2276-74-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2276-73-0x000000006494A000-0x000000006494F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0333ecac229eb22.exe

MD5 b6f7de71dcc4573e5e5588d6876311fc
SHA1 645b41e6ea119615db745dd8e776672a4ba59c57
SHA256 73437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad
SHA512 ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036bb55bb30d.exe

MD5 aa75aa3f07c593b1cd7441f7d8723e14
SHA1 f8e9190ccb6b36474c63ed65a74629ad490f2620
SHA256 af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1
SHA512 b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0337242833e.exe

MD5 d1ec05df172b32843f1564bc34feef68
SHA1 29ae8b1a96f294b2f420c7710c81740e79eb2b91
SHA256 e7bfb6e1cba02dd07c20e937a535193f25e87194be8fa6f949a967dc7bd919cf
SHA512 500e55b9976837acf11c97021361f7a57c7425f25e95aab20f5d83fe5c8d582de7bcae0b500cbaf85da52fc739aaaef7a3bd5f8d8b500820b83a0bbd286d26fb

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0376e7a8f67a.exe

MD5 a3ba569405d0fa3f577e9c83b6c303af
SHA1 2ba0d6724aa30dc474ee00a06573e8652a117eac
SHA256 2799a1a7d1a6d1e1dc2746bea858c4052cab03833b069beac261a9f4ad56be90
SHA512 f23907f89db9e9bc6ce80faf1577a461de9ddd23009069a3ab4ab8bc18f610a6c5b44bac5469145fdc61ba130755c02baf83783d7a31d0de747d1b11f260ad0d

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03c16839a9b.exe

MD5 8427ae0ce0ded0794b9e0b3dd422702e
SHA1 6e5350072840eb80a09e2c28ce22c2bca8e2aab1
SHA256 8ca5df6f0a4bbc6ae6a0f56b5b2c72e253c4cc72c40919d8984039de8f45e41a
SHA512 90cb046d28eb7e956f99e024a89c05a14cae99580122d99fe49872b36c8f8de95331dd4fee60458b118f96ab40baf770c3f07dbcef2b4b6530832fcb00feac78

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03ff1e89e18831.exe

MD5 74e88352f861cb12890a36f1e475b4af
SHA1 7dd54ab35260f277b8dcafb556dd66f4667c22d1
SHA256 64578ffca840ebc3f791f1faa21252941d9fd384622d54a28226659ad05650a3
SHA512 18a6911b0d86088d265f49471c52d901a39d1549f9ac36681946a1b91fdb2f71f162ddf4b4659be061302fae6d616852d44c9a151f66eb53bbcc2fde6e7b9463

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03184374b6827dae2.exe

MD5 7df1d7d115da507238cf409fa1bd0b91
SHA1 a133c62a14f3871c552a0bcad87a291d5744c2cf
SHA256 2bed8e9c8a557e04ab5f5c3b2a4a26133f62993277dbf0fa0ab574eabb4eddd0
SHA512 2ab249240a4c76d65a225787f2207f38a08cd3e2756bf23c2446343a583fb32a51b5e5674c3af2100a55e53ab49167c462061f251d19e3f89c23526d752c688a

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon0318a4864788e065.exe

MD5 47e1245ae15e44e2df28280d95ad2741
SHA1 cb5abc70156154368ff10271fa1c1e80dab6d417
SHA256 c614c4dfbc4fd75a9ccd3ed8b14440de34a7c1945ccf865a414e2e3111162696
SHA512 032df7df40c06266c25a25a2efd945bfd7591dc442b3f4183163491f432f1be8ce2b0554067c3fe02361aeb962bd53d20878db3bec495a52c13787b31dceadeb

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon036f89e9eef8271.exe

MD5 f85794c2bf341a1efe78cdad0b1b4dc5
SHA1 d7ff2be2dafed282b5eda883ee7d02a4eca75194
SHA256 6455d5f4eae530ace507b2ac338777b408e99094acf96bbef7603d7af641b833
SHA512 91f98cff29225a025114013a9ce7423a3e5646725a927606f66577724a691b367004ca8d36ce51f129243a6a87003abd8dd09fa7b195e8ecf70fbc73305f7790

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon034a40f4c2.exe

MD5 99918fe3d5011f5e084492e0d9701779
SHA1 55f7a03c6380bb9f51793be0774681b473e07c9f
SHA256 558a67043fbcd0bc37d34c99ff16f66b259b24b44811516ceff678964ec655c4
SHA512 682f1c6c648319c974e608defa41b714d0e8c3670d3f5e669b7227aaf5400285f9f0c6c5c82c50518031d8a93a3cfd591031651068d5a458a6606f2bf51d3e12

C:\Users\Admin\AppData\Local\Temp\7zS8C90AE86\Mon03f186a0d10.exe

MD5 28a0b3751b521af221baa3a76f32c8c1
SHA1 f71aaa12ac600549120b062cbbd852b1a1807c43
SHA256 710ceb98e12443d28a9fd280b453eade11bc3483f6280dc224eb48ed327028ca
SHA512 a3773694f59a8f4c7cd06f7dc97c41bf943cf2e9b6283027964890f0122e26c9822e6b91b3ac23eacefa6954b0b983e7dd9226bfb37682f1645f8c85b24fda4f

memory/2276-72-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2276-71-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2276-70-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2276-69-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2276-67-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2276-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2276-63-0x000000006B440000-0x000000006B4CF000-memory.dmp

\Users\Admin\AppData\Local\Temp\7zS8C90AE86\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

memory/3024-125-0x0000000002830000-0x000000000290E000-memory.dmp

memory/1268-128-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/1268-127-0x0000000000990000-0x0000000000A6E000-memory.dmp

memory/1268-126-0x0000000000990000-0x0000000000A6E000-memory.dmp

memory/3024-124-0x0000000002830000-0x000000000290E000-memory.dmp

memory/1340-121-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R9LERCXGAG1C844WL2OQ.temp

MD5 dcf4f50ce561a246cff7c72d5c50e5f9
SHA1 64f7d1918aba9db94deb21c015bb39641b98d629
SHA256 5e926cbf02a5ddcf8b947ddd87dc1919007d233d35d05a7adb32a11db46f8c01
SHA512 dfaa0c78a9a10f423eba173920ea78b5427e9c5f6c1c8e777bb855ac970ee72771a71feec18a3da7c06fc179ec5802bb9fb887199c21087712ef5d67e608b017

memory/2396-144-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/2428-145-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-BP2MN.tmp\Mon034a40f4c2.tmp

MD5 9303156631ee2436db23827e27337be4
SHA1 018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256 bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA512 9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

memory/1340-156-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-L0F13.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

C:\Users\Admin\AppData\Local\Temp\is-L0F13.tmp\idp.dll

MD5 b37377d34c8262a90ff95a9a92b65ed8
SHA1 faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256 e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA512 69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

memory/1904-167-0x0000000000FD0000-0x000000000105A000-memory.dmp

memory/672-168-0x0000000000D90000-0x0000000000DE8000-memory.dmp

memory/2400-169-0x00000000027E0000-0x00000000037E0000-memory.dmp

memory/672-170-0x0000000000150000-0x0000000000156000-memory.dmp

memory/672-171-0x00000000004B0000-0x00000000004F6000-memory.dmp

memory/672-172-0x0000000000160000-0x0000000000166000-memory.dmp

memory/2400-187-0x000000002E080000-0x000000002E131000-memory.dmp

memory/2400-188-0x0000000002040000-0x00000000020DC000-memory.dmp

memory/2400-189-0x0000000002040000-0x00000000020DC000-memory.dmp

memory/2400-191-0x0000000002040000-0x00000000020DC000-memory.dmp

memory/2276-192-0x0000000000400000-0x000000000051C000-memory.dmp

memory/2276-201-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/2276-200-0x0000000064940000-0x0000000064959000-memory.dmp

memory/2276-199-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/2276-198-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/2276-196-0x000000006EB40000-0x000000006EB63000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 7165e9d7456520d1f1644aa26da7c423
SHA1 177f9116229a021e24f80c4059999c4c52f9e830
SHA256 40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
SHA512 fe80996a7f5c64815c19db1fa582581aa1934ea8d1050e686b4f65bcdd000df1decdf711e0e4b1de8a2aa4fcb1ac95cebb0316017c42e80d8386bd3400fcaecb

memory/356-207-0x0000000000400000-0x000000000047C000-memory.dmp

memory/3024-211-0x0000000002830000-0x000000000290E000-memory.dmp

memory/2692-212-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2692-224-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2692-222-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2692-221-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2692-220-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2692-218-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2692-216-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2692-214-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1268-230-0x0000000000990000-0x0000000000A6E000-memory.dmp

memory/1268-229-0x0000000000990000-0x0000000000A6E000-memory.dmp

memory/3024-228-0x0000000002830000-0x000000000290E000-memory.dmp

memory/396-231-0x0000000000400000-0x00000000004D3000-memory.dmp

memory/1268-235-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/1268-233-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/1728-232-0x0000000000400000-0x000000000053F000-memory.dmp

memory/1084-240-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/2428-239-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2400-241-0x0000000002040000-0x00000000020DC000-memory.dmp

memory/2400-242-0x000000002E140000-0x000000002F2C7000-memory.dmp

memory/2400-243-0x000000002F2D0000-0x000000002F366000-memory.dmp

memory/2400-244-0x000000002F370000-0x000000002F400000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabE051.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

memory/2740-257-0x00000000028D0000-0x00000000038D0000-memory.dmp

memory/2400-258-0x00000000027E0000-0x00000000037E0000-memory.dmp

memory/2740-260-0x000000002E190000-0x000000002E241000-memory.dmp

memory/2740-261-0x0000000000520000-0x00000000005BC000-memory.dmp

memory/2740-264-0x0000000000520000-0x00000000005BC000-memory.dmp

memory/2740-262-0x0000000000520000-0x00000000005BC000-memory.dmp

memory/2740-266-0x0000000000520000-0x00000000005BC000-memory.dmp

memory/2740-267-0x000000002E250000-0x000000002F3D7000-memory.dmp

memory/2740-268-0x000000002F3E0000-0x000000002F476000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\f77d2e9.exe

MD5 620bda3df817bff8deb38758d1dc668c
SHA1 9933523941851b42047f2b7a1324eb8daa8fb1ff
SHA256 b74d7ff45768a1ee6f267e895de3e46cca505edf205563ef3f7db827f38363b3
SHA512 bc9e932860f63090bab251057bc1fd6875c410c2358321eaa74fccc117561b91e4ce6b24d5e7bb13dc44732ae151b7c33fe201acbb5af689d7f2d248dfb8c568

memory/2012-313-0x00000000010A0000-0x00000000010A8000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-29 12:47

Reported

2024-11-29 12:49

Platform

win10v2004-20241007-en

Max time kernel

120s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe"

Signatures

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

Fabookie family

fabookie

NullMixer

dropper nullmixer

Nullmixer family

nullmixer

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Socelars

stealer socelars

Socelars family

socelars

Socelars payload

Description Indicator Process Target
N/A N/A N/A N/A

Vidar

stealer vidar

Vidar family

vidar

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Vidar Stealer

stealer
Description Indicator Process Target
N/A N/A N/A N/A

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
N/A N/A C:\Windows\SysWOW64\rundll32.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

ASPack v2.12-2.42

aspackv2
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\is-MHLE7.tmp\Mon034a40f4c2.tmp N/A
Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0376e7a8f67a.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0333ecac229eb22.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0337242833e.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\rundll32.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0337242833e.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-MHLE7.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon036f89e9eef8271.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03ff1e89e18831.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0376e7a8f67a.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon036bb55bb30d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0318a4864788e065.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03c16839a9b.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0333ecac229eb22.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\is-BD0K4.tmp\Mon034a40f4c2.tmp N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\e58c927.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfhgpjbcoignfibliobpclhpfnadhofn\10.59.13_0\manifest.json C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A iplogger.org N/A N/A
N/A iplogger.org N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Looks up geolocation information via web service

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 5056 set thread context of 1496 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe

Browser Information Discovery

discovery

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon036f89e9eef8271.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0376e7a8f67a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\rundll32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0318a4864788e065.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\taskkill.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0337242833e.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-MHLE7.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0333ecac229eb22.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon036bb55bb30d.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\is-BD0K4.tmp\Mon034a40f4c2.tmp N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\control.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\e58c927.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\11111.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0318a4864788e065.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0318a4864788e065.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0318a4864788e065.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133773580922245668" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0376e7a8f67a.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0337242833e.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeTcbPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeSystemtimePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeBackupPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeAuditPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeUndockPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeManageVolumePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeImpersonatePrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: 31 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: 32 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: 33 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: 34 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: 35 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03c16839a9b.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\taskkill.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4876 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe
PID 4876 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe
PID 4876 wrote to memory of 892 N/A C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe
PID 892 wrote to memory of 536 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 536 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 536 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3044 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 3044 wrote to memory of 3132 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3044 wrote to memory of 3132 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 3044 wrote to memory of 3132 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 536 wrote to memory of 1720 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 536 wrote to memory of 1720 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 536 wrote to memory of 1720 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 892 wrote to memory of 3928 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3928 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3928 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 4628 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 4372 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3744 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3744 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3744 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 4616 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 4616 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 4616 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3400 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3400 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 3400 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1472 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1472 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 892 wrote to memory of 1472 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe C:\Windows\SysWOW64\cmd.exe
PID 2760 wrote to memory of 3824 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe
PID 2760 wrote to memory of 3824 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe
PID 2760 wrote to memory of 3824 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe
PID 4628 wrote to memory of 3000 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0337242833e.exe
PID 4628 wrote to memory of 3000 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0337242833e.exe
PID 4628 wrote to memory of 3000 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0337242833e.exe
PID 3824 wrote to memory of 408 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3824 wrote to memory of 408 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 3824 wrote to memory of 408 N/A C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4372 wrote to memory of 5056 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe
PID 4372 wrote to memory of 5056 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe
PID 4372 wrote to memory of 5056 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe
PID 3928 wrote to memory of 2204 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe
PID 3928 wrote to memory of 2204 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe
PID 3928 wrote to memory of 2204 N/A C:\Windows\SysWOW64\cmd.exe C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe
PID 3744 wrote to memory of 4916 N/A C:\Windows\SysWOW64\cmd.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe

"C:\Users\Admin\AppData\Local\Temp\e0cab8a5482851e6f5803e7733f7fbbf0e50fc3b0427b6386c3c4fd99a8d73d5N.exe"

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe

"C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03f186a0d10.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0337242833e.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon034a40f4c2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03184374b6827dae2.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0333ecac229eb22.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03ff1e89e18831.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036f89e9eef8271.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0376e7a8f67a.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon0318a4864788e065.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon03c16839a9b.exe

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c Mon036bb55bb30d.exe /mixtwo

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe

Mon034a40f4c2.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0337242833e.exe

Mon0337242833e.exe

C:\Users\Admin\AppData\Local\Temp\is-MHLE7.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-MHLE7.tmp\Mon034a40f4c2.tmp" /SL5="$B006E,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 892 -ip 892

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe

Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe

Mon03f186a0d10.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0333ecac229eb22.exe

Mon0333ecac229eb22.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03c16839a9b.exe

Mon03c16839a9b.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon036f89e9eef8271.exe

Mon036f89e9eef8271.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03ff1e89e18831.exe

Mon03ff1e89e18831.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0376e7a8f67a.exe

Mon0376e7a8f67a.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon036bb55bb30d.exe

Mon036bb55bb30d.exe /mixtwo

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0318a4864788e065.exe

Mon0318a4864788e065.exe

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 588

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3864 -ip 3864

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 408

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe

"C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe" /SILENT

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0333ecac229eb22.exe

"C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0333ecac229eb22.exe" -u

C:\Users\Admin\AppData\Local\Temp\is-BD0K4.tmp\Mon034a40f4c2.tmp

"C:\Users\Admin\AppData\Local\Temp\is-BD0K4.tmp\Mon034a40f4c2.tmp" /SL5="$801D4,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe" /SILENT

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1072 -ip 1072

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 356

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /CookiesFile "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies" /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Windows\SysWOW64\cmd.exe

cmd.exe /c taskkill /f /im chrome.exe

C:\Windows\SysWOW64\control.exe

"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\taskkill.exe

taskkill /f /im chrome.exe

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Users\Admin\AppData\Local\Temp\11111.exe

C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffef9eecc40,0x7ffef9eecc4c,0x7ffef9eecc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2392,i,8652401863003649395,2800283170205956232,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2388 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1820,i,8652401863003649395,2800283170205956232,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2424 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2124,i,8652401863003649395,2800283170205956232,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2528 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,8652401863003649395,2800283170205956232,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3384,i,8652401863003649395,2800283170205956232,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3400 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4552,i,8652401863003649395,2800283170205956232,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4540 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3660,i,8652401863003649395,2800283170205956232,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3680 /prefetch:8

C:\Windows\system32\RunDll32.exe

C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\SFNX63.cPl",

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4992,i,8652401863003649395,2800283170205956232,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5008 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc

C:\Users\Admin\AppData\Local\Temp\e58c927.exe

"C:\Users\Admin\AppData\Local\Temp\e58c927.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4604 -ip 4604

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 784

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 hornygl.xyz udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 www.listincode.com udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 iplogger.org udp
US 104.26.2.46:443 iplogger.org tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 46.2.26.104.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 bthuu.com udp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.200.3:80 c.pki.goog tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 3.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 datingmart.me udp
US 8.8.8.8:53 mstdn.social udp
DE 49.13.236.103:443 mstdn.social tcp
US 8.8.8.8:53 103.236.13.49.in-addr.arpa udp
US 8.8.8.8:53 61.45.26.184.in-addr.arpa udp
US 8.8.8.8:53 r11.o.lencr.org udp
GB 2.22.144.142:80 r11.o.lencr.org tcp
US 8.8.8.8:53 qoto.org udp
US 100.24.65.138:443 qoto.org tcp
US 8.8.8.8:53 142.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 r10.o.lencr.org udp
GB 2.22.144.142:80 r10.o.lencr.org tcp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 138.65.24.100.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
GB 172.217.16.228:443 www.google.com tcp
US 8.8.8.8:53 www.hhiuew33.com udp
GB 172.217.16.228:443 www.google.com udp
US 8.8.8.8:53 35.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 10.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 228.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
N/A 127.0.0.1:50587 tcp
N/A 127.0.0.1:50589 tcp
US 8.8.8.8:53 clients2.google.com udp
GB 142.250.178.14:443 clients2.google.com tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FR 77.233.110.97:8080 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
US 8.8.8.8:53 gp.gamebuy768.com udp
FI 65.108.69.168:13293 tcp
US 8.8.8.8:53 gp.gamebuy768.com udp

Files

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\setup_install.exe

MD5 cd66b43b6558d0e17a0e92fd7ac42787
SHA1 90aedefa4b7082676d02568eb31012e40d1d6655
SHA256 ea8907747931024f386f148247b5cf0c1fff53df0d61ab6a1d85c84809511aab
SHA512 5f5848a056eaab118bf2a80fdf5fc0b6262654c9564a955f9e956ed89c102c610346e1d8de75a4b1840166062fe3299b70c049c8f6d25109cc073a91288a0b8b

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\libwinpthread-1.dll

MD5 1e0d62c34ff2e649ebc5c372065732ee
SHA1 fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256 509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA512 3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\libcurlpp.dll

MD5 e6e578373c2e416289a8da55f1dc5e8e
SHA1 b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA256 43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA512 9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\libcurl.dll

MD5 d09be1f47fd6b827c81a4812b4f7296f
SHA1 028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA256 0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512 857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

memory/892-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/892-69-0x0000000064940000-0x0000000064959000-memory.dmp

memory/1720-70-0x00000000731EE000-0x00000000731EF000-memory.dmp

memory/1720-72-0x00000000024E0000-0x0000000002516000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03184374b6827dae2.exe

MD5 7df1d7d115da507238cf409fa1bd0b91
SHA1 a133c62a14f3871c552a0bcad87a291d5744c2cf
SHA256 2bed8e9c8a557e04ab5f5c3b2a4a26133f62993277dbf0fa0ab574eabb4eddd0
SHA512 2ab249240a4c76d65a225787f2207f38a08cd3e2756bf23c2446343a583fb32a51b5e5674c3af2100a55e53ab49167c462061f251d19e3f89c23526d752c688a

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon034a40f4c2.exe

MD5 99918fe3d5011f5e084492e0d9701779
SHA1 55f7a03c6380bb9f51793be0774681b473e07c9f
SHA256 558a67043fbcd0bc37d34c99ff16f66b259b24b44811516ceff678964ec655c4
SHA512 682f1c6c648319c974e608defa41b714d0e8c3670d3f5e669b7227aaf5400285f9f0c6c5c82c50518031d8a93a3cfd591031651068d5a458a6606f2bf51d3e12

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0337242833e.exe

MD5 d1ec05df172b32843f1564bc34feef68
SHA1 29ae8b1a96f294b2f420c7710c81740e79eb2b91
SHA256 e7bfb6e1cba02dd07c20e937a535193f25e87194be8fa6f949a967dc7bd919cf
SHA512 500e55b9976837acf11c97021361f7a57c7425f25e95aab20f5d83fe5c8d582de7bcae0b500cbaf85da52fc739aaaef7a3bd5f8d8b500820b83a0bbd286d26fb

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03f186a0d10.exe

MD5 28a0b3751b521af221baa3a76f32c8c1
SHA1 f71aaa12ac600549120b062cbbd852b1a1807c43
SHA256 710ceb98e12443d28a9fd280b453eade11bc3483f6280dc224eb48ed327028ca
SHA512 a3773694f59a8f4c7cd06f7dc97c41bf943cf2e9b6283027964890f0122e26c9822e6b91b3ac23eacefa6954b0b983e7dd9226bfb37682f1645f8c85b24fda4f

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03c16839a9b.exe

MD5 8427ae0ce0ded0794b9e0b3dd422702e
SHA1 6e5350072840eb80a09e2c28ce22c2bca8e2aab1
SHA256 8ca5df6f0a4bbc6ae6a0f56b5b2c72e253c4cc72c40919d8984039de8f45e41a
SHA512 90cb046d28eb7e956f99e024a89c05a14cae99580122d99fe49872b36c8f8de95331dd4fee60458b118f96ab40baf770c3f07dbcef2b4b6530832fcb00feac78

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon036bb55bb30d.exe

MD5 aa75aa3f07c593b1cd7441f7d8723e14
SHA1 f8e9190ccb6b36474c63ed65a74629ad490f2620
SHA256 af890b72e50681eee069a7024c0649ac99f60e781cb267d4849dae4b310d59c1
SHA512 b1984c431939e92ea6918afbbc226691d1e46e48f11db906fec3b7e5c49075f33027a2c6a16ab4861c906faa6b50fddc44201922e44a0243f9883b701316ca2b

memory/3132-85-0x00000000056A0000-0x0000000005CC8000-memory.dmp

memory/3824-89-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon036f89e9eef8271.exe

MD5 f85794c2bf341a1efe78cdad0b1b4dc5
SHA1 d7ff2be2dafed282b5eda883ee7d02a4eca75194
SHA256 6455d5f4eae530ace507b2ac338777b408e99094acf96bbef7603d7af641b833
SHA512 91f98cff29225a025114013a9ce7423a3e5646725a927606f66577724a691b367004ca8d36ce51f129243a6a87003abd8dd09fa7b195e8ecf70fbc73305f7790

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0318a4864788e065.exe

MD5 47e1245ae15e44e2df28280d95ad2741
SHA1 cb5abc70156154368ff10271fa1c1e80dab6d417
SHA256 c614c4dfbc4fd75a9ccd3ed8b14440de34a7c1945ccf865a414e2e3111162696
SHA512 032df7df40c06266c25a25a2efd945bfd7591dc442b3f4183163491f432f1be8ce2b0554067c3fe02361aeb962bd53d20878db3bec495a52c13787b31dceadeb

memory/3864-140-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/1720-123-0x00000000731E0000-0x0000000073990000-memory.dmp

memory/3132-118-0x0000000005FA0000-0x00000000062F4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-ELVSG.tmp\idp.dll

MD5 b37377d34c8262a90ff95a9a92b65ed8
SHA1 faeef415bd0bc2a08cf9fe1e987007bf28e7218d
SHA256 e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f
SHA512 69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0376e7a8f67a.exe

MD5 a3ba569405d0fa3f577e9c83b6c303af
SHA1 2ba0d6724aa30dc474ee00a06573e8652a117eac
SHA256 2799a1a7d1a6d1e1dc2746bea858c4052cab03833b069beac261a9f4ad56be90
SHA512 f23907f89db9e9bc6ce80faf1577a461de9ddd23009069a3ab4ab8bc18f610a6c5b44bac5469145fdc61ba130755c02baf83783d7a31d0de747d1b11f260ad0d

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon03ff1e89e18831.exe

MD5 74e88352f861cb12890a36f1e475b4af
SHA1 7dd54ab35260f277b8dcafb556dd66f4667c22d1
SHA256 64578ffca840ebc3f791f1faa21252941d9fd384622d54a28226659ad05650a3
SHA512 18a6911b0d86088d265f49471c52d901a39d1549f9ac36681946a1b91fdb2f71f162ddf4b4659be061302fae6d616852d44c9a151f66eb53bbcc2fde6e7b9463

memory/5056-100-0x0000000000DB0000-0x0000000000E3A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\Mon0333ecac229eb22.exe

MD5 b6f7de71dcc4573e5e5588d6876311fc
SHA1 645b41e6ea119615db745dd8e776672a4ba59c57
SHA256 73437218cd12895c7a59c0c03009417705ed231d323e3a1ad279750e46bcc8ad
SHA512 ca297d40f0e2cc45d5737627a1aaeec61bf7c6f425acadb14e689b4392fcc4a17e74dc1514fb3bf8d9a6a91b5cea38801996a2a7ee2dee0c335bfb2f103c6d42

memory/3132-99-0x0000000005F30000-0x0000000005F96000-memory.dmp

memory/3132-98-0x0000000005DD0000-0x0000000005E36000-memory.dmp

memory/3132-101-0x00000000731E0000-0x0000000073990000-memory.dmp

memory/3132-95-0x00000000055E0000-0x0000000005602000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-MHLE7.tmp\Mon034a40f4c2.tmp

MD5 9303156631ee2436db23827e27337be4
SHA1 018e0d5b6ccf7000e36af30cebeb8adc5667e5fa
SHA256 bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4
SHA512 9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

memory/3132-87-0x00000000731E0000-0x0000000073990000-memory.dmp

memory/1720-77-0x00000000731E0000-0x0000000073990000-memory.dmp

memory/3132-71-0x00000000731E0000-0x0000000073990000-memory.dmp

memory/892-68-0x000000006494A000-0x000000006494F000-memory.dmp

memory/892-67-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/892-66-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/892-65-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/892-64-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/892-63-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/892-62-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/892-60-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/892-59-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/892-58-0x000000006B440000-0x000000006B4CF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\libstdc++-6.dll

MD5 5e279950775baae5fea04d2cc4526bcc
SHA1 8aef1e10031c3629512c43dd8b0b5d9060878453
SHA256 97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512 666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

memory/892-56-0x000000006B440000-0x000000006B4CF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSC03327A7\libgcc_s_dw2-1.dll

MD5 9aec524b616618b0d3d00b27b6f51da1
SHA1 64264300801a353db324d11738ffed876550e1d3
SHA256 59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA512 0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

memory/892-53-0x00000000007A0000-0x000000000082F000-memory.dmp

memory/892-51-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/3780-131-0x0000023168D30000-0x0000023168D88000-memory.dmp

memory/5056-130-0x0000000003200000-0x0000000003276000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pcfcufvj.pw2.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3780-142-0x0000023169130000-0x0000023169136000-memory.dmp

memory/5056-141-0x00000000030D0000-0x00000000030EE000-memory.dmp

memory/5056-148-0x0000000005D10000-0x00000000062B4000-memory.dmp

memory/3780-149-0x0000023169140000-0x0000023169186000-memory.dmp

memory/3780-156-0x000002316AAB0000-0x000002316AAB6000-memory.dmp

memory/3824-158-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1720-174-0x0000000005B30000-0x0000000005B7C000-memory.dmp

memory/1720-172-0x0000000005A30000-0x0000000005A4E000-memory.dmp

memory/3864-185-0x0000000000400000-0x00000000004DE000-memory.dmp

memory/892-184-0x000000006FE40000-0x000000006FFC6000-memory.dmp

memory/892-183-0x0000000064940000-0x0000000064959000-memory.dmp

memory/892-182-0x000000006B280000-0x000000006B2A6000-memory.dmp

memory/892-181-0x000000006B440000-0x000000006B4CF000-memory.dmp

memory/892-179-0x000000006EB40000-0x000000006EB63000-memory.dmp

memory/892-175-0x0000000000400000-0x000000000051C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 b968c57a14ddada4128356f6e39fb66c6d864d3f
SHA256 0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
SHA512 4d4275338cd8a089c25757440b876654b569d39bfd970109cceb09c29ca79c8f3b1fdfcc6316ef18a9eb68cddf0c2d6daa0fa27fafc1f27b8103b4aa1db1fbc5

memory/1072-192-0x0000000000400000-0x00000000004D3000-memory.dmp

memory/3436-195-0x0000000000400000-0x0000000000455000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-QP204.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

memory/4672-152-0x0000000000400000-0x0000000000414000-memory.dmp

memory/408-150-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/1720-210-0x000000006E040000-0x000000006E08C000-memory.dmp

memory/1720-220-0x00000000060E0000-0x00000000060FE000-memory.dmp

memory/1720-209-0x00000000060A0000-0x00000000060D2000-memory.dmp

memory/1720-224-0x0000000006CD0000-0x0000000006D73000-memory.dmp

memory/3132-225-0x000000006E040000-0x000000006E08C000-memory.dmp

memory/2620-238-0x0000000002BD0000-0x0000000003BD0000-memory.dmp

memory/1720-240-0x0000000006E00000-0x0000000006E1A000-memory.dmp

memory/1720-239-0x0000000007440000-0x0000000007ABA000-memory.dmp

memory/1720-241-0x00000000731EE000-0x00000000731EF000-memory.dmp

memory/3132-242-0x00000000731E0000-0x0000000073990000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

MD5 b7161c0845a64ff6d7345b67ff97f3b0
SHA1 d223f855da541fe8e4c1d5c50cb26da0a1deb5fc
SHA256 fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66
SHA512 98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

memory/1496-249-0x0000000000400000-0x0000000000420000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Mon03184374b6827dae2.exe.log

MD5 e5352797047ad2c91b83e933b24fbc4f
SHA1 9bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256 b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512 dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827

memory/1496-252-0x0000000005140000-0x0000000005152000-memory.dmp

memory/1496-253-0x0000000005270000-0x000000000537A000-memory.dmp

memory/1496-251-0x00000000055A0000-0x0000000005BB8000-memory.dmp

memory/1720-250-0x0000000006E80000-0x0000000006E8A000-memory.dmp

memory/1496-257-0x00000000051A0000-0x00000000051DC000-memory.dmp

memory/1720-258-0x0000000007070000-0x0000000007106000-memory.dmp

memory/3132-259-0x0000000007AB0000-0x0000000007AC1000-memory.dmp

memory/3568-260-0x0000000000400000-0x000000000053F000-memory.dmp

memory/1720-261-0x00000000731E0000-0x0000000073990000-memory.dmp

memory/3132-262-0x00000000731E0000-0x0000000073990000-memory.dmp

memory/3132-273-0x00000000731E0000-0x0000000073990000-memory.dmp

memory/4668-276-0x0000000000400000-0x000000000047C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\11111.exe

MD5 7165e9d7456520d1f1644aa26da7c423
SHA1 177f9116229a021e24f80c4059999c4c52f9e830
SHA256 40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
SHA512 fe80996a7f5c64815c19db1fa582581aa1934ea8d1050e686b4f65bcdd000df1decdf711e0e4b1de8a2aa4fcb1ac95cebb0316017c42e80d8386bd3400fcaecb

memory/3132-280-0x0000000007AE0000-0x0000000007AEE000-memory.dmp

memory/1720-286-0x00000000731E0000-0x0000000073990000-memory.dmp

memory/1720-284-0x0000000007040000-0x0000000007054000-memory.dmp

memory/1720-287-0x0000000007130000-0x000000000714A000-memory.dmp

memory/1720-289-0x0000000007120000-0x0000000007128000-memory.dmp

memory/1720-299-0x00000000731E0000-0x0000000073990000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 ec9cf1d51a740bcc1cfb38c112d0f30e
SHA1 271e5d8f5492c8d3511fea03e62adef58eababce
SHA256 479e12e4962abe6443f8f3c0e08b03f06e184f15aa6b59c4dd2786217e14c744
SHA512 6054ea06d7ca6e6dfc1e7288c95a6543487357d73261c62bd384ddff7987d9b3f08fcfdb11e5bc5ed6c2f9a79cc57686c1950cb94f14b31f781b669ca3c20d90

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

MD5 968cb9309758126772781b83adb8a28f
SHA1 8da30e71accf186b2ba11da1797cf67f8f78b47c
SHA256 92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA512 4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

memory/3132-300-0x00000000731E0000-0x0000000073990000-memory.dmp

\??\pipe\crashpad_2412_NLLHKNKXXODNMSUM

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 5301fc97e344cb79e2dd4b81d973941c
SHA1 790005e0f4d0418f8abc114cf4904e6b60918a0d
SHA256 eb06116c32ce47773d534f37e22680cfbfd62fd1c9494b3d4ea00c89ffe7cfb9
SHA512 27a669945470384e29b7bcdecb9d7191eb2808aab69e4b219cf04b778d47cca936fe777be6eb537a92199125e1471ed5bf7ce13c8eecb7b253b413c931394014

memory/3520-306-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/4672-305-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2620-307-0x000000002DB60000-0x000000002DC11000-memory.dmp

memory/2620-312-0x000000002D6A0000-0x000000002D73C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

MD5 cb1b474457dcd604ef40872ab957f5f6
SHA1 90dafbdd4d7a44149ac383d22d0304d582e26f65
SHA256 20ad0049997ce595144bc66b87a62bebd0e9ec075b60c9768fd66dcb26a70a67
SHA512 50de78a698902f03694e6b3273e8806bdb39e81d1c282c8919d38c9120151ced947b80805876f2ff7700b4627ac70a5b04093b622707b72c4a3067ef1f5dfbbc

memory/2620-316-0x000000002D6A0000-0x000000002D73C000-memory.dmp

memory/2620-314-0x000000002D6A0000-0x000000002D73C000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

memory/2620-322-0x0000000002BD0000-0x0000000003BD0000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 9965b6297a9a9074688616b7ecfd09c5
SHA1 a06575bd11630e5666571d71288a0acb53fa8d99
SHA256 3739f265ddbd6acae980ce8b1897ae9ac60698ff8909575e0a8fe82f251e6998
SHA512 8d7b233767996bb3b5d60f5fe277ce20549237cb6f9e74028878c4db05f2e7af55b7295d65fd02f7bfa131b2bf1373304e0acf9c4bd88a236fa006d4cca8e242

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 b539a0f4ecbd756486d875e1a38860b2
SHA1 8f9e3d50e7cc63b7e8e3c14896d7e5060ac290d6
SHA256 4818e4c4e5261d5aedaf063dd7cd458b7e5c7c77b65730c53e12003dc8d35bf9
SHA512 e57f6b400d839fe33e2f969eade4a6a3915aded3bb7c560b2e8b4e2c29906fad65f6750fc3140ad8f8c1489f90d21ba5f72b802953c41b3a55e115cb3e11eeea

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 f216eace1666443f8f42135ea4b52cfe
SHA1 0c7885ea766cf20d4ed2c34bfbce5da27bc41100
SHA256 c1b5e3e0c1a04c76f457193bb9479028be8059e8aa7fa84921dcf4a358192b3c
SHA512 955a7ca4b4959cb54f881715beaa9216d9d2abf140761702922e5021bcc67753dfe6c000b92557c62721fdd58ffd2cbefb27e9e87daffbf166cb9475d9881661

memory/2620-351-0x000000002D6A0000-0x000000002D73C000-memory.dmp

memory/2620-352-0x000000002DC20000-0x000000002EDA7000-memory.dmp

memory/2620-353-0x000000002EDB0000-0x000000002EE46000-memory.dmp

memory/2620-355-0x000000002EE50000-0x000000002EEE0000-memory.dmp

memory/4296-358-0x0000000002930000-0x0000000003930000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 bd44fb91d3aed34c08e048de31894a7a
SHA1 909d9cb9603df1f94da0324a04b2aac3239e7492
SHA256 6c3bd5b165cab53fd4e57b8dcc346c5ee1a1d24d74eaa87649b36b4fafc186bf
SHA512 570f57318013dcdce1d7670b367db63ad29180a33907dbf0074696caaa3d5da5102f47c57a78977662ecb3323aef62a8d8f42445a41c040fd9145138d99d3bef

memory/4296-364-0x000000002D8B0000-0x000000002D961000-memory.dmp

memory/4296-365-0x000000002D400000-0x000000002D49C000-memory.dmp

memory/4296-366-0x000000002D400000-0x000000002D49C000-memory.dmp

memory/4296-368-0x000000002D400000-0x000000002D49C000-memory.dmp

memory/4296-374-0x0000000002930000-0x0000000003930000-memory.dmp

memory/4296-375-0x000000002D400000-0x000000002D49C000-memory.dmp

memory/4296-376-0x000000002D970000-0x000000002EAF7000-memory.dmp

memory/4296-377-0x000000002EB00000-0x000000002EB96000-memory.dmp

memory/4296-378-0x000000002EBA0000-0x000000002EC30000-memory.dmp

memory/4296-381-0x000000002EBA0000-0x000000002EC30000-memory.dmp

memory/4296-382-0x0000000000820000-0x0000000000823000-memory.dmp

memory/4296-383-0x0000000000830000-0x0000000000835000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

MD5 de1ae4738e9302fb9e6fe181337c7901
SHA1 bae2bb25694b671000ed7fe0adb2271ce101f997
SHA256 d18d55cf9311f7ab3e8f589ac4269e372abe98fc3e48c381f0807e994d599cee
SHA512 539b342f5fde62d9da53ea727b61edd80062ae5cec2df11b4df31319e72d7c73dc22a5fd0cfa561955d664d7c1ab95ef66a0c39ae9ab3d7bed5952a545c60142

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 52fcf3a972eb5b6a7900c0ada9315375
SHA1 cca62db2ed48c53535bdfb5695e127a163382ffe
SHA256 6773c1375fe225f33ea79ffd3b8f8c3e1045d26570d3d569bbe8c1a780e4892f
SHA512 f71c0b64be9028117d0fa50f6fbe4a71e7954b48cefc646c6d2362bea81ce4bad066d6fcdc0ec207a119e00e90c7c569894d05b7dd93750758ad5559a2319c86

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 75d84de01752aee7a0dfab8b9eafd7ae
SHA1 2527570174de2d5c0a3c1e3888919c696e3458a2
SHA256 394c12fdff1f0a34ff8343d51a3386eddad476cabfa578889dd092e23d7d3bc7
SHA512 01daee01c05635b7975312eff3f57c12f07eea0c87b2364a3695dd8960f29fe01bfe4b55887f7918892bdc0e591ff0141062c34026b5b1e19034be5259a9c2f8

C:\Users\Admin\AppData\Local\Temp\e58c927.exe

MD5 620bda3df817bff8deb38758d1dc668c
SHA1 9933523941851b42047f2b7a1324eb8daa8fb1ff
SHA256 b74d7ff45768a1ee6f267e895de3e46cca505edf205563ef3f7db827f38363b3
SHA512 bc9e932860f63090bab251057bc1fd6875c410c2358321eaa74fccc117561b91e4ce6b24d5e7bb13dc44732ae151b7c33fe201acbb5af689d7f2d248dfb8c568

memory/4604-441-0x0000000000CB0000-0x0000000000CB8000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 4acf8dfc000b472f6e5f9bc3aa3d873e
SHA1 115ab89e93af8daa614ed74d74df6e659b6c5c2f
SHA256 d6c942154005b64bf8fc2e4727ce1c4813bc72d322bb27da6cef8de3b218fb3b
SHA512 cc31e515e722570fd1bf0a359402d31a992892513b6c19345007eb06d07cb421e39adafe0cd82cc38b766aab551d159eddd0020109b3f7bd672e611c43880938

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 a8aa9f7dc1b9f0a9b726e96046aeae24
SHA1 242b5113bcaee37a51e9b19e0ef57ac207dd51ad
SHA256 85e3cb5894fb2d9fa552102c052147d1efa42bcefabb164a12a7e153b39a4d16
SHA512 8737946f56c0c16cbb8d84141ccc6516e4fe6eb628c558be2c71f9d72fcfc09edb535b55db0f112a9f399122b339089de65d58d292107da6ca2880ea6eebe783

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 66f9dae1c492bd276c5e02fea7a75bbd
SHA1 e0419f03192de8070e758a9002136792fcd507eb
SHA256 1f39af4edcec219dd9970e075f1cc11305f578cb42e4edbb8aeaed49bdbf3551
SHA512 cf6f8af52a27f06f6730ea30a1e653945605ddd6b63f479b62e59d4ce5ed80f633e734b49e6513793fc7ceb677e6f8ef120833c5c95be5e6b96380bed194dbf7

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\f2324a49-7444-4c15-8f26-de147d116d1f.tmp

MD5 f840ee672198de3401b77ee74656db4e
SHA1 03ac0780e9705e4b6b9fe22fa9cb2d7a4b949f7a
SHA256 15cc8f35805c09f809110f90502c03b014ae3c065a82b3d5cd78e580b2e652af
SHA512 73932c8e69a2003a3048bb9c37a4aa1c4d6bda256143f40aaa0e12f76d5012382a03e832e323536f6bfcc143292a0081b5b6184f54d7ee5b4fc97bcf1e2fd82e