Analysis

  • max time kernel
    190s
  • max time network
    192s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    27/02/2025, 03:08

General

  • Target

    http://195.177.94.227/myfiles/coinbase.exe

Malware Config

Extracted

Family

asyncrat

Version

Esco Private rat

Botnet

Default

C2

196.251.88.53:4449

Mutex

voodynqjploelta

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 17 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://195.177.94.227/myfiles/coinbase.exe
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffcc69fcc40,0x7ffcc69fcc4c,0x7ffcc69fcc58
      2⤵
        PID:1796
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1916 /prefetch:2
        2⤵
          PID:4800
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2156 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          PID:3640
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2460 /prefetch:8
          2⤵
            PID:1128
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3052,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3088 /prefetch:1
            2⤵
              PID:3644
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3212 /prefetch:1
              2⤵
                PID:4896
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=4856,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4984 /prefetch:8
                2⤵
                  PID:4796
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5032,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5148 /prefetch:8
                  2⤵
                    PID:3996
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5036,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5348 /prefetch:8
                    2⤵
                      PID:3276
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5500,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5280 /prefetch:8
                      2⤵
                        PID:3840
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5376,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3832 /prefetch:1
                        2⤵
                          PID:1636
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4996,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5176 /prefetch:1
                          2⤵
                            PID:1124
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5576,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5540 /prefetch:8
                            2⤵
                              PID:4648
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5664,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5680 /prefetch:8
                              2⤵
                                PID:2852
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5220,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5108 /prefetch:1
                                2⤵
                                  PID:2244
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3064,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5272 /prefetch:1
                                  2⤵
                                    PID:4740
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3160,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5228 /prefetch:8
                                    2⤵
                                      PID:3812
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5800,i,6077419927013804200,4585188092271764357,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5620 /prefetch:8
                                      2⤵
                                        PID:2916
                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                      1⤵
                                        PID:3652
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                        1⤵
                                          PID:1916
                                        • C:\Windows\System32\rundll32.exe
                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                          1⤵
                                            PID:3416
                                          • C:\Users\Admin\Downloads\coinbase.exe
                                            "C:\Users\Admin\Downloads\coinbase.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:4716
                                            • C:\Users\Admin\AppData\Local\Temp\is-QDRIQ.tmp\coinbase.tmp
                                              "C:\Users\Admin\AppData\Local\Temp\is-QDRIQ.tmp\coinbase.tmp" /SL5="$30286,721126,73216,C:\Users\Admin\Downloads\coinbase.exe"
                                              2⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              PID:1308
                                              • C:\Users\Admin\Downloads\coinbase.exe
                                                "C:\Users\Admin\Downloads\coinbase.exe" /VERYSILENT
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:3876
                                                • C:\Users\Admin\AppData\Local\Temp\is-CDGVE.tmp\coinbase.tmp
                                                  "C:\Users\Admin\AppData\Local\Temp\is-CDGVE.tmp\coinbase.tmp" /SL5="$302AC,721126,73216,C:\Users\Admin\Downloads\coinbase.exe" /VERYSILENT
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:1004
                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                    "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\netapi32_2.ocx"
                                                    5⤵
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3240
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
                                                      6⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4000
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exe
                                                      "PowerShell.exe" -NoProfile -NonInteractive -Command -
                                                      6⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:648
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
                                                      6⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4652
                                                      • C:\Windows\System32\Conhost.exe
                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        7⤵
                                                          PID:4000
                                            • C:\Users\Admin\Downloads\coinbase.exe
                                              "C:\Users\Admin\Downloads\coinbase.exe"
                                              1⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:2940
                                              • C:\Users\Admin\AppData\Local\Temp\is-GD4HJ.tmp\coinbase.tmp
                                                "C:\Users\Admin\AppData\Local\Temp\is-GD4HJ.tmp\coinbase.tmp" /SL5="$40284,721126,73216,C:\Users\Admin\Downloads\coinbase.exe"
                                                2⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                PID:2868
                                                • C:\Users\Admin\Downloads\coinbase.exe
                                                  "C:\Users\Admin\Downloads\coinbase.exe" /VERYSILENT
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3124
                                                  • C:\Users\Admin\AppData\Local\Temp\is-P15BQ.tmp\coinbase.tmp
                                                    "C:\Users\Admin\AppData\Local\Temp\is-P15BQ.tmp\coinbase.tmp" /SL5="$8026C,721126,73216,C:\Users\Admin\Downloads\coinbase.exe" /VERYSILENT
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of FindShellTrayWindow
                                                    PID:3840
                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                      "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\netapi32_2.ocx"
                                                      5⤵
                                                      • Loads dropped DLL
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:5032
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
                                                        6⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:4360
                                            • C:\Windows\system32\regsvr32.EXE
                                              "C:\Windows\system32\regsvr32.EXE" /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
                                              1⤵
                                                PID:4272
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
                                                  2⤵
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2660
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
                                                    3⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • System Location Discovery: System Language Discovery
                                                    PID:4756
                                              • C:\Windows\system32\regsvr32.EXE
                                                "C:\Windows\system32\regsvr32.EXE" /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
                                                1⤵
                                                  PID:3992
                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                    /s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx
                                                    2⤵
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    PID:776
                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
                                                      3⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3084
                                                • C:\Users\Admin\Downloads\coinbase.exe
                                                  "C:\Users\Admin\Downloads\coinbase.exe"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1376
                                                  • C:\Users\Admin\AppData\Local\Temp\is-RK6IU.tmp\coinbase.tmp
                                                    "C:\Users\Admin\AppData\Local\Temp\is-RK6IU.tmp\coinbase.tmp" /SL5="$80280,721126,73216,C:\Users\Admin\Downloads\coinbase.exe"
                                                    2⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2648
                                                    • C:\Users\Admin\Downloads\coinbase.exe
                                                      "C:\Users\Admin\Downloads\coinbase.exe" /VERYSILENT
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4796
                                                      • C:\Users\Admin\AppData\Local\Temp\is-I1IGJ.tmp\coinbase.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-I1IGJ.tmp\coinbase.tmp" /SL5="$B0278,721126,73216,C:\Users\Admin\Downloads\coinbase.exe" /VERYSILENT
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of FindShellTrayWindow
                                                        PID:644
                                                        • C:\Windows\SysWOW64\regsvr32.exe
                                                          "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\netapi32_2.ocx"
                                                          5⤵
                                                          • Loads dropped DLL
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4132
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL C:\Users\Admin\AppData\Roaming\netapi32_2.ocx' }) { exit 0 } else { exit 1 }"
                                                            6⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4528
                                                • C:\Windows\system32\mmc.exe
                                                  "C:\Windows\system32\mmc.exe" "C:\Windows\system32\WF.msc"
                                                  1⤵
                                                  • Drops file in System32 directory
                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:776

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                  Filesize

                                                  649B

                                                  MD5

                                                  dac574fa2326388d48e3c248b7ec22c9

                                                  SHA1

                                                  1602f32ef54938441810828b856adba367b83abe

                                                  SHA256

                                                  3ad09f73c2cb94238bf3e1bdeeb619f2d2e7f029517b3255cf39f7b946161699

                                                  SHA512

                                                  3a3a12c3f060fa1597be81a5570861eb24f63af8a2b38972c10a827cef417833b59eb1c3d522194651d3317bea3cda067d34f50288e280983484f4b6c7b0ce5d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000012

                                                  Filesize

                                                  41KB

                                                  MD5

                                                  e54a8e3ff39023a57b4d70bd012e9a9b

                                                  SHA1

                                                  a1cdc7ca30c559ca8d74a36c77d8de88c7b83141

                                                  SHA256

                                                  5b2082d4e78f090ac854cf92f5b295f6e2d1a3ac9cd2054837868fbc5f56db74

                                                  SHA512

                                                  9758ba53d6515fd1a561b1d524b765e69c9c7c6b9bc593761b21d582d7d74e21ab3ec22a689b6fdd6f91b92df1e527e3f973e8c25219091be70ea96e990df1c0

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000013

                                                  Filesize

                                                  214KB

                                                  MD5

                                                  d20fef07db1e8a9290802e00d1d65064

                                                  SHA1

                                                  71befda9256ed5b8cd8889f0eeab41c50d66e64e

                                                  SHA256

                                                  f9cb4624d03224bfce50c4c0e484418acd462c249f38b4684e72b27a1f30144d

                                                  SHA512

                                                  ad5b2c8df60027c6dd5104bb8c2357b04eb24d69245c607ff99a6f2a887f929428252ad793d9aaa8c903c7b1e1bf9653cd35f79747d5281e7e3d2c21fa828537

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  8868aa80cc14a396063fef80ae4054da

                                                  SHA1

                                                  8622a5031c8e0a4b33a75b27ac452193fcdf688c

                                                  SHA256

                                                  e225647d6b7318f5f7ab4504a9c14f8f397d01a56e4b97a9cc1cd56a7223b7bf

                                                  SHA512

                                                  f72dce02e9e99cae455930f095e53cbd2432be83b679928df6c1a91a76e575a7d0c152fea4207685ea733d785e245353de70105e7d4fadc9c99a05073afb8dd0

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  5782092739d32d4e6bdff8bdddeaf3cf

                                                  SHA1

                                                  df80c965b9716334640b34a14ca2d5c33f7459ae

                                                  SHA256

                                                  e2289e8e5f4ca6185ee2193898034c90e984d5b78563f60d82c8420648d0134c

                                                  SHA512

                                                  e72dff7dfe4645f702699186828dcb7b78ad6924734f15d8c52ba9f28a3f65d8390a62c4dc8e675610dc11037622f1eb5ae3ae562d9fca72a2ed2db9ef94c6d5

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.virustotal.com_0.indexeddb.leveldb\000003.log

                                                  Filesize

                                                  59KB

                                                  MD5

                                                  be4de2d1c52e43ed3a5baa1a0fc3cb9e

                                                  SHA1

                                                  dc18a39f1e91c607c98d0f1ab4680a390ef85a19

                                                  SHA256

                                                  bc01c125cacdce1c59531d220fca5b54f41828edc925583fef752db1882ea7cc

                                                  SHA512

                                                  4cf4a5dd15d583d62dadf518d56f609d3e627198c28e22368d6fc9694bd9d095ec9f43ee012109056eb88aa50ca8bcb981c79e7ef328168446613055b8c891c7

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.virustotal.com_0.indexeddb.leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  46295cac801e5d4857d09837238a6394

                                                  SHA1

                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                  SHA256

                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                  SHA512

                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.virustotal.com_0.indexeddb.leveldb\LOG

                                                  Filesize

                                                  355B

                                                  MD5

                                                  3b987a429d0cea51f1b1301da81e43a8

                                                  SHA1

                                                  72dccd2d54fb2a6c8b070c0b87f9fa4aa78e1e89

                                                  SHA256

                                                  e9e33ff008bf38d303a5671a48e6e70d2ae96618826c6708c587ea6235cadd67

                                                  SHA512

                                                  1751f1cf40b3c9832dabda536e03d852a1b543c8151e6c92b3c018d8ef46066e922911b82cad5fded2a61b2accd87432a3c86c0c1e3fac2388752115c811e0f8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.virustotal.com_0.indexeddb.leveldb\MANIFEST-000001

                                                  Filesize

                                                  23B

                                                  MD5

                                                  3fd11ff447c1ee23538dc4d9724427a3

                                                  SHA1

                                                  1335e6f71cc4e3cf7025233523b4760f8893e9c9

                                                  SHA256

                                                  720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed

                                                  SHA512

                                                  10a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  8bdd349d7040e8bbb66a6a19843fe53d

                                                  SHA1

                                                  938de08441b996f0a7b1c7561be4a8ede752c934

                                                  SHA256

                                                  0e4cffcf15997feeffc985ca67981988f5853766c8f1b0b6ae8979b1aea9a47e

                                                  SHA512

                                                  2d256d66dcb317266ba2e0b82f72d049f715b54555aa4b11f2cc0316df22e8b789562048732ae6dcf3ad99cd67269248cc29522647f5b9d316e149a51ef5f9f5

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                  Filesize

                                                  2B

                                                  MD5

                                                  d751713988987e9331980363e24189ce

                                                  SHA1

                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                  SHA256

                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                  SHA512

                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  858B

                                                  MD5

                                                  f1cc41ec6a2a97bef1e0fa920186054d

                                                  SHA1

                                                  f23c14182039425a316ea2221703ff896d220090

                                                  SHA256

                                                  852da0598a4adac804ef542a5fa56b36c6dbbe8da05e75ca159594093d5fafcf

                                                  SHA512

                                                  eb58baeb4ad8037eb6a67bb3cdf235f0b495ed6d2b627f8aed9bfc8e76c354935ceafb629ad44a7d91817ec7f10cc5bc98ffd89dee30ea80e965c75a206123d2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  8ed7a67e00fb9f60d06d406f37936b99

                                                  SHA1

                                                  6c1370dd49118d0de7c9bdfc6caf6fba2ee1b0eb

                                                  SHA256

                                                  92335a8abcddf7f3292ebc6182728a5d4b2fb391b484477b14ea4d63ea6ce3bf

                                                  SHA512

                                                  9b2f299a9ec57646972ab7bb49ecbe3692c6f7932af75f33972051b345940c4faab60e2754b38ffbef29223cea8cd66f62e2f3f0f37684a7b01fcc7a642b686f

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  8e2b55d2d5cabe0e736ab72d4f097288

                                                  SHA1

                                                  bec4c56cbd6da1ffe81e063fa0292ba334103524

                                                  SHA256

                                                  f51a9f54e78bcb904075f78332e77920c0238eae815bc5a7ec548657362c4384

                                                  SHA512

                                                  b3f6954ac4cdba5113807f1cfd2be994486535a13a9216df8b7f947106be141f6cbc2793acb05989d0996a949e3efcb8ba347dbc7472729f3aa68000b6ec9806

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  b1555201a9c6be24a994f7d7cb917419

                                                  SHA1

                                                  28b2ba37eceb1bbcb99e94462a3a8c4454733c6e

                                                  SHA256

                                                  11a5f73a38c26ed65331aa2e9b3b0ea0e576c442cad067d5116987481de701d6

                                                  SHA512

                                                  b2f3356b214cd0d9c9211973068e975c827bc2567dace2a7817663226711682605c50020821b69e79ab385d61ad38e09bd244c0702ca5c44495b0ef517fd9ee1

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  ea8e65b7b8441717fd04e2b44a4680f9

                                                  SHA1

                                                  13378cbd92b92350db4ad7fc78c8ab17e61e2a1a

                                                  SHA256

                                                  148df28bc67ae02f9cc1e21f718e5bcc685ff31cc033045ad41aec667baa1858

                                                  SHA512

                                                  0595ba006886ce80104bd8cb71e934023f1bcb35e564ef02727cfc5b49217865eb234273c11a245c0c37a30e8b1b56aebc5e50755031145123863569828b438a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  817d8a3b36621503acb9170112245842

                                                  SHA1

                                                  7b25baa717e717550f77319d6a954d90a0d9738f

                                                  SHA256

                                                  0d8e8dcfd279f69026b47761b19034791c14d06952d3872bf3464d0fc319f07b

                                                  SHA512

                                                  c818ffb748df4748226c82d8991221c8edcef88cf291084318cc95ef366ab1860c79beeaf9cd5d64dd17279a20f63289b1e6812ef32bc79cb7148b56662f38fe

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  bb709805ecfd6ba66d477ef1f172f5ce

                                                  SHA1

                                                  f4ca2288c8cf985aebf783741306f2bb0ac83359

                                                  SHA256

                                                  4c4bd3b6446b871f83e065a8d2318edef1d0569e6b94aaa615b7790d597bbca7

                                                  SHA512

                                                  a9788cd8146250ae0eb9f8455d3b3ad394a0feee09a2c56577e0fc0abbae6644f01496e4d8e8e1dff002dfd5cdaefb0e86ea9fed9548d60401ea2d3e6b9f8c84

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  0bf3ab2917b01204f5b69aace4b70161

                                                  SHA1

                                                  d835d91a1bbc232148b7c8b01811f11147170ed6

                                                  SHA256

                                                  ea134759afc212ae855df93b553b5fa7bd95c3b9219b5b15aa00ad8268866b5c

                                                  SHA512

                                                  89921d33f271caa780b90f9e6bb5c18c65fb695a62a8960b6f1e54e70c735dd1cdcef17a9ad729e5d5bb91c5879062a837a54a4ef2be210e40adf8755244ee75

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  6818618d77a26786e6a289b72aea2475

                                                  SHA1

                                                  87b159799e472bea7730e93d1690175d71d66062

                                                  SHA256

                                                  81486d7ee09e5f781ec01794a01cfe11fc9ce7d44a9996bbb896f17a9f5a12a1

                                                  SHA512

                                                  533ed85e252b505d3305033ecbf44701d0fd88745d60e6eae211deb19f4411b92d63e80b8ea8cd93d70cfd98b72dcb22a3274cbf89caad686a2fa6b52de71105

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  68fc587a9ab6c78ce830c7ac6a99672d

                                                  SHA1

                                                  dc5acc619d9de3564167f20ab0e5b2ca1fac7290

                                                  SHA256

                                                  e6bbd9b9089e91f5cdc9b2074bac054a720ce068a0e7878d511c7ddc8f5c5b28

                                                  SHA512

                                                  6766c8f8cad9768b5e660ec0b76d92214325171d41bfe819cebfb586b7c0ca5159395ee617a2cb2be12911572d2d56775fad1dc2fb3947f6c5deb999e47c6c72

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  9d337f5356cbe485224f94b258e7e221

                                                  SHA1

                                                  328478c53296aa8c3f771dd9e14ab18403d1a3c4

                                                  SHA256

                                                  3e2b23873f10a2320ffbc82984e81c227fd0e2501488e4ab6fc448ded1370148

                                                  SHA512

                                                  c5195f93aa0730636e4dd4cc160a705c55862a8e03d6fcb158b4aeec14c6e4c09f2850b7ebbb23050a3c8476637f95d72d482088a8a49691363cb6c478b786c8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  484256b213fd35df8c454dd87d90ee3b

                                                  SHA1

                                                  39dc31412aacc9f1318a350b88c7f33a8e78d68d

                                                  SHA256

                                                  b8c5525e99e919760cfd40b02bf07a7b49b22562f8f0bdc4655987c334a9fecb

                                                  SHA512

                                                  e02dbeddcc82ae4dc83a22ab389c2e91ba8da907fb38a022d14f2e4605407e5a7893d4434a0c5957b09630faafca94a86a60b8b77153410581e87409975e8dcc

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  ddbe9819e9be2b958c9eb32f369e8708

                                                  SHA1

                                                  370ac2e9ca879eeff34ad66d60d9264941092893

                                                  SHA256

                                                  ca7095ee178beb3669f5c3a61c88d3e49cbe346551e64ebc32a506e0aecded73

                                                  SHA512

                                                  605980d37c81cd03ff3cb9c8304a3e630f00d237fcd2249866ffab03313b1de6b4ec43dc884385986eab7e876744df8c9c05d7d65419eb9ec75cdbd593595501

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  9KB

                                                  MD5

                                                  a3c1539b5f32575be0bb32e22e69d093

                                                  SHA1

                                                  59accf1976a37846e8abf85806396b342b19b193

                                                  SHA256

                                                  465e71f7faf20959b0825d627c171f1b770b5beeb249d61c079300a00aaa0078

                                                  SHA512

                                                  bf40ff7d997cced476129d1aaebe4a7cb965f63c27e82dfd99aa6342c5ebc061510174fbb0ff2af37b4e2a4b08cb83b4b1874b6c1b13343427d9df23be3ba065

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\198b1dbef7ece2ad03770a72810f2b485859f245\54b8b1b4-5d62-450b-97ec-9d5d5fde3eb1\90e3cd78029af102_0

                                                  Filesize

                                                  64KB

                                                  MD5

                                                  b6f8927cd1005b84df7517ad6f419ec8

                                                  SHA1

                                                  f3b582f7011b3e03e73a3c795d3f92a260ec0e48

                                                  SHA256

                                                  525ec770df156bd63dcc3b587faf046fecfeda2116d2387e3694455cb78d6284

                                                  SHA512

                                                  2cc3c3e07886656201cff092dbcf2234f609758b3fd979ba7e86538f32233fa6603c0293d90d726ce88c73d9722623b435bebc771a76bb34507f83dc0543fc22

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\198b1dbef7ece2ad03770a72810f2b485859f245\54b8b1b4-5d62-450b-97ec-9d5d5fde3eb1\index-dir\the-real-index

                                                  Filesize

                                                  432B

                                                  MD5

                                                  1dde050fee02c7b9310a900c5be17014

                                                  SHA1

                                                  7032645df6f72f674108253b45dc19099ddb00c5

                                                  SHA256

                                                  3d27696c1c0c56c5b3aee7b73688250856a6b42a156654a931182f0defaba230

                                                  SHA512

                                                  0fc155dddcee20e8c0b9609cb450791dcfabfd48bfefb777e322c7d417d34f2192a1d93f9513ca440957ee88ba68a7ee59413316f8c08588b796b0542b91c4cd

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\198b1dbef7ece2ad03770a72810f2b485859f245\54b8b1b4-5d62-450b-97ec-9d5d5fde3eb1\index-dir\the-real-index~RFe59e7c6.TMP

                                                  Filesize

                                                  48B

                                                  MD5

                                                  81d3ab449944103ed60bcef9a48ad9ee

                                                  SHA1

                                                  164d16913e56d91acc3de054a6a54820ffeb99c8

                                                  SHA256

                                                  be7154207945774d1e698f56c5f44bc902762e4843bd2f51dc877b850a3c1832

                                                  SHA512

                                                  e5a26e18a743eb41433845fc857f3c89121ffec0df5c9dc9323f8a0dfc87767496e5c99845905298b1a40b36c259785a25bc8efe4de31c6e6b88b55fe8126c5e

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\198b1dbef7ece2ad03770a72810f2b485859f245\index.txt

                                                  Filesize

                                                  123B

                                                  MD5

                                                  72a0dced4b48f9e92bf718d0ea6643c9

                                                  SHA1

                                                  a33b774dc662e06e23b0bc70c02fa6d7a27e872b

                                                  SHA256

                                                  9ad6c81060dd4666e08ef8eddaa1ebed9d826c7e5c879df44def3ba60f07cf6c

                                                  SHA512

                                                  ffdadc3494791f964236b5ff82bf112cc2dd94c852de80216ccc7202217d9035c0662e08ba655df6b59419777de167e4307041a075fe1f7070f293a9d6462385

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\198b1dbef7ece2ad03770a72810f2b485859f245\index.txt~RFe59e7f5.TMP

                                                  Filesize

                                                  128B

                                                  MD5

                                                  e403e73f708c1a149f485391f4802f5a

                                                  SHA1

                                                  13f28a0e392e4deadc70e21adf090cea1ecbf9cd

                                                  SHA256

                                                  6cd96aa5574adbc070d8b456fc6376e1ab45f3a011aa9d6bfc2644ca3a591de2

                                                  SHA512

                                                  285a8654a58c6d74ae41235a9f97ab1a6f49189ef81b0c647cc2aa5b684f5ea6cbf98716a30d3b4e01257ebe2e34ba6ab79e5ea00798248f7368c06d541de02d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                  Filesize

                                                  96B

                                                  MD5

                                                  d4c1b21045f0232cb34ed11bfff76c3e

                                                  SHA1

                                                  718457450652dc816170eb058dba158262781802

                                                  SHA256

                                                  61a83a3b8502e2e32e1f1b78d073608341050d7af4801574d20f02b1a934becd

                                                  SHA512

                                                  e7f3ab16d51c0d0a8f1a8a10d2ad2efa50770da6296e0f8f8ecf2c307a9164c281c33500291b4bf8bd41c4b841291c14b12410a9d9d961dece290092b17eb70b

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  123KB

                                                  MD5

                                                  1c709d40a987d6aee4da957f732169af

                                                  SHA1

                                                  b906b3e25f809fc231b773b1c2a3d2c102aee955

                                                  SHA256

                                                  395be0c775f5ec9b42c1007ae84ccdabf42b01ac41a41f760f08bacd29d50784

                                                  SHA512

                                                  122ea679a437379701092c26d58311deef72bf12f213d924e053b53878ac95d91c37e0f23731fc6ae6feaea9d364cb666f5fef01a66d63b8579ab710af5ea090

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  123KB

                                                  MD5

                                                  3fcc4a5154b3b0b4c6eaaa987a6c0a76

                                                  SHA1

                                                  56d81bc42653dec3012f4d975cc0db7db0f7dd55

                                                  SHA256

                                                  8f25eda441a91d969d1538268b5ff9d323f343b68450ecc12635d8c9cb3b2b25

                                                  SHA512

                                                  e333b690af83c420872859baedd5122f908e8af888874bfa5b219ad0c775e8df7565885f5f22f4cf98cfc4ca63d30133d85acc497c6b6f70988766c6532756f8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  123KB

                                                  MD5

                                                  d723e456a295940efc550d7b6f6771f6

                                                  SHA1

                                                  dd0ac165f0ad3f82c53929d3a70d84414c63e0c4

                                                  SHA256

                                                  445c5bb85a335b2ba3076f2e3dfd0255364d8e734b57fed968c04bc562dd6acb

                                                  SHA512

                                                  89cb34e83f7c3a00a84232b2c6a2bef93914b47b58624752171ddfa90702b7894af3d34f54634f667583416a4c56245370050838b1847f64a2d537e6cdb160ce

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PowerShell.exe.log

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  f8634c179c1a738e20815ec466527e78

                                                  SHA1

                                                  5ff99194f001b39289485a6c6fa0ba8b5f50aa42

                                                  SHA256

                                                  b97b56e7ceecc7fe39522d3989d98bd233353d0269a7f6517e4a8286b4ed1dc4

                                                  SHA512

                                                  806b40ab4b2cd38140210d1bff3317d51af96008526298aee07e67fa858d5e9646ba594d87a5f22ec5026ee25b93f62d600eb6da92216dfb524b28260fa7388f

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  a24224d8406214c35972cbdd6375f192

                                                  SHA1

                                                  12da3b653296b5e948485433efc361f96bd52035

                                                  SHA256

                                                  aa4d2bfa8473873343530ba05ec8e53e4a34ddf431d3bd0b68f46658a8e24694

                                                  SHA512

                                                  06e816c041aa88e8bc42cddd87389f70ee4b0fc10da11c40f0a240abaf8f969065fef10c1e77b45109db9fc4ca7ec28422767e00601f41af93fc09134db38525

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  742f8fd256cc26b622455217f90eab46

                                                  SHA1

                                                  d558aa66ba6552159fdc3e17b0c1e369b004d695

                                                  SHA256

                                                  1f4ff1c9e44bb2503ddea55e5a6802d7924736c78e9d38212bef7013c6f14096

                                                  SHA512

                                                  cc24b1076f567853f5b64bdd0f7bde4d43d5ba45b8fe0e7daa8528edbba3dd6f98f0909b8411e0fddfe0fd85fc1db4abfca4119a7947fae52dd2f7d71ea1e906

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  21KB

                                                  MD5

                                                  9a1bf4da04c4f915d62e7bd654c57230

                                                  SHA1

                                                  4c097c329bcb0e5950584eeea7c26b2ec908bb8b

                                                  SHA256

                                                  441dcdefcb3954a9b61211c4da82b3153f1e48a1b2f9cc613d2f3923c8c4ea56

                                                  SHA512

                                                  e24cde5c2f88e7118b0bdae93fdb47464b3c1f6c8a2d05edcbd444c8369b97eeea2ad0955a436c8c975d23e743173b03ef472ed1c2b8e8479fa6f8532fa50fe9

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  64B

                                                  MD5

                                                  c0ce174d3e3741915afe8c653a794481

                                                  SHA1

                                                  bfffedb9259bbd5d12c661185a3f83a47906afa6

                                                  SHA256

                                                  7eb382f45bd849193659f607439f6d1b830ae8db66a24ae9db570a96c977f39b

                                                  SHA512

                                                  418a7901af29056407eec151641fba9bc95494282375c114cea6c2bc4068f8636badcb3250ca8afa3e650800b995c47917362582a152012194c1b750261f8a07

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  35b7b3e292ab25266e56b8c4dbaedf7c

                                                  SHA1

                                                  027da7fb8321fde3965eaae3e18e4d08c62ab73c

                                                  SHA256

                                                  d326c525e882354fbc6123fc1d1582bad7bcd4cd27641a6c4c1e054067ca58e9

                                                  SHA512

                                                  3ec806959e12bde9c33994e8e5d999814d5820a6e0900b5deed81ddc7324cf93c25345be203a5977ab27ba504579025a83f7e6b5421137b7e58177dbb10f6a7b

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  f73621b5346de1f7256bbbc69bf82805

                                                  SHA1

                                                  687c5fb45102393c9ef1046012fb5cb97f7d5822

                                                  SHA256

                                                  47a36249eb40e7a9cae04b523d1ad1b6b7109c6e95394c0e9a79e66952573de4

                                                  SHA512

                                                  1a3f8919d93583f537f2af8a6fd3e2ba6d87bc9c7110adb9394bb9b4719e09ec02699455e07366f3e19d95b1c000aecae57e51d0fc78115417ba1e0237f6a3f8

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xqpu00p5.0kc.psm1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\is-4LC5E.tmp\_isetup\_isdecmp.dll

                                                  Filesize

                                                  13KB

                                                  MD5

                                                  a813d18268affd4763dde940246dc7e5

                                                  SHA1

                                                  c7366e1fd925c17cc6068001bd38eaef5b42852f

                                                  SHA256

                                                  e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                                                  SHA512

                                                  b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                                                • C:\Users\Admin\AppData\Local\Temp\is-86D6E.tmp\_isetup\_shfoldr.dll

                                                  Filesize

                                                  22KB

                                                  MD5

                                                  92dc6ef532fbb4a5c3201469a5b5eb63

                                                  SHA1

                                                  3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                  SHA256

                                                  9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                  SHA512

                                                  9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                • C:\Users\Admin\AppData\Local\Temp\is-HC98D.tmp\_isetup\_RegDLL.tmp

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  0ee914c6f0bb93996c75941e1ad629c6

                                                  SHA1

                                                  12e2cb05506ee3e82046c41510f39a258a5e5549

                                                  SHA256

                                                  4dc09bac0613590f1fac8771d18af5be25a1e1cb8fdbf4031aa364f3057e74a2

                                                  SHA512

                                                  a899519e78125c69dc40f7e371310516cf8faa69e3b3ff747e0ddf461f34e50a9ff331ab53b4d07bb45465039e8eba2ee4684b3ee56987977ae8c7721751f5f9

                                                • C:\Users\Admin\AppData\Local\Temp\is-HC98D.tmp\_isetup\_setup64.tmp

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  4ff75f505fddcc6a9ae62216446205d9

                                                  SHA1

                                                  efe32d504ce72f32e92dcf01aa2752b04d81a342

                                                  SHA256

                                                  a4c86fc4836ac728d7bd96e7915090fd59521a9e74f1d06ef8e5a47c8695fd81

                                                  SHA512

                                                  ba0469851438212d19906d6da8c4ae95ff1c0711a095d9f21f13530a6b8b21c3acbb0ff55edb8a35b41c1a9a342f5d3421c00ba395bc13bb1ef5902b979ce824

                                                • C:\Users\Admin\AppData\Local\Temp\is-QDRIQ.tmp\coinbase.tmp

                                                  Filesize

                                                  711KB

                                                  MD5

                                                  9917f679a0135245a5cc6b1aadcb3a6c

                                                  SHA1

                                                  7aab67a56fd3e10fd070e29d2998af2162c0a204

                                                  SHA256

                                                  a0090b3a687e7d0a6d6b6918bcbb798ebecb184cba8d3eb5fe4345ec9aba9243

                                                  SHA512

                                                  87194d9f3c97b48a297faef76e3a308de6b454d10a5b50adeb22336982ca5bd5ba3a1cacb39cfbaf78a3befbc37967eb89a7c84cfdd53054204647dffd5b35cd

                                                • C:\Users\Admin\AppData\Local\unins000.dat

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  e74132b43e0bcc045c068b5ea3670709

                                                  SHA1

                                                  5186878e47bb248b1b06429bc0de6d0316016990

                                                  SHA256

                                                  e7ad75508a3d8b97045eec0c7a50de0f01145765add9e7b3b55aa7252f725871

                                                  SHA512

                                                  78017afdf91b476769da754060b3a1f5e5971d684886fd6bcc4b34715af203321f5bea6b877a59b321b1f8dcc7fe0618361a9d5401fa9079148450af23b06c0d

                                                • C:\Users\Admin\AppData\Local\unins000.dat

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  395e02d2016f54259066f7ce8b7d9ba0

                                                  SHA1

                                                  a543e7838fa2babd281b6307feec3ee1ed6138ac

                                                  SHA256

                                                  330a0b890cf446b09f90fabb89c3cc5b99a2d792c575e6de1a5eda32804a8f4a

                                                  SHA512

                                                  77f810654c71e2e01901627c28449d1d2e9901fc1f1f8b9e8015430c362962341dfc5687c826cd24dafeb8bb839cc1c50e58a4a867013a1f5aeaa29b8a7c07a4

                                                • C:\Users\Admin\AppData\Local\unins000.exe

                                                  Filesize

                                                  721KB

                                                  MD5

                                                  6434badd7ee8afd03f38f26bc4cd0685

                                                  SHA1

                                                  91fc9fc687fafee23c9aa02bdbb020a763a3cee5

                                                  SHA256

                                                  c04c08e891b6fccd6d6c71fc0864471cda0b5dc10d1650bf0b87213f3add4701

                                                  SHA512

                                                  29be93e75e88d48976daa3b895402d0853ff75079f23396741d8146ea687da36916354068550458ea146e63d42e6fa3d2afa43108ed0174ca83428b18c5e81e9

                                                • C:\Users\Admin\AppData\Roaming\netapi32_2.ocx

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  c87013ae4715ff280d9f8d2fe749cdba

                                                  SHA1

                                                  5e7e78ca3d2f799cb9befb0a2f13a1d5636a04af

                                                  SHA256

                                                  fef9803aa84de828968ffcaebab6050c109147d96420a753b9a6b5d1968ed4bf

                                                  SHA512

                                                  af9292f763dcd829d3d3d5aa1cd38bae54c2ceb92572f231ede1793e303173f3ba7eef17fe167a0fdc7dd25a9869bd18da4d9e3cb5c75573f1edb6ff1f2e5aaf

                                                • C:\Users\Admin\Downloads\Unconfirmed 703076.crdownload

                                                  Filesize

                                                  949KB

                                                  MD5

                                                  5f41899fe8f7801b20885898e0f4c05a

                                                  SHA1

                                                  b696ed30844f88392897eb9c0d47cfabcf9ad5f3

                                                  SHA256

                                                  62f7943a38968bc1d92d0ea08c185bf01b6a8daf5812bb30e25899b9ada0daed

                                                  SHA512

                                                  c9490f3359df8be70a21e88cc940c3486391fbc089cb026d5570cc235133f63dd6e8dfc6cce8db9dd11cb64d2a5be6d0329abb15713f5bfb37d9c362f9e3220a

                                                • memory/644-1033-0x0000000000400000-0x00000000004C2000-memory.dmp

                                                  Filesize

                                                  776KB

                                                • memory/648-184-0x00000000744E0000-0x000000007452C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/648-198-0x0000000007CC0000-0x0000000007D63000-memory.dmp

                                                  Filesize

                                                  652KB

                                                • memory/648-223-0x0000000007F70000-0x0000000007F81000-memory.dmp

                                                  Filesize

                                                  68KB

                                                • memory/776-1132-0x000000001DCC0000-0x000000001E1A6000-memory.dmp

                                                  Filesize

                                                  4.9MB

                                                • memory/776-978-0x0000000075490000-0x0000000075607000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/1004-105-0x0000000000400000-0x00000000004C2000-memory.dmp

                                                  Filesize

                                                  776KB

                                                • memory/1308-62-0x0000000000400000-0x00000000004C2000-memory.dmp

                                                  Filesize

                                                  776KB

                                                • memory/1308-80-0x0000000000400000-0x00000000004C2000-memory.dmp

                                                  Filesize

                                                  776KB

                                                • memory/1376-1007-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/1376-980-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/2648-1004-0x0000000000400000-0x00000000004C2000-memory.dmp

                                                  Filesize

                                                  776KB

                                                • memory/2660-515-0x0000000075490000-0x0000000075607000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/2868-202-0x0000000000400000-0x00000000004C2000-memory.dmp

                                                  Filesize

                                                  776KB

                                                • memory/2940-204-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/2940-167-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/3084-967-0x00000000700A0000-0x00000000700EC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/3124-200-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/3124-232-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/3240-276-0x0000000075490000-0x0000000075607000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/3240-297-0x0000000005040000-0x0000000005058000-memory.dmp

                                                  Filesize

                                                  96KB

                                                • memory/3240-298-0x00000000056C0000-0x0000000005C66000-memory.dmp

                                                  Filesize

                                                  5.6MB

                                                • memory/3240-300-0x0000000075490000-0x0000000075607000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/3240-301-0x00000000053D0000-0x0000000005462000-memory.dmp

                                                  Filesize

                                                  584KB

                                                • memory/3240-302-0x0000000005370000-0x000000000537A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/3240-305-0x0000000006050000-0x00000000060EC000-memory.dmp

                                                  Filesize

                                                  624KB

                                                • memory/3240-307-0x0000000075490000-0x0000000075607000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/3840-231-0x0000000000400000-0x00000000004C2000-memory.dmp

                                                  Filesize

                                                  776KB

                                                • memory/3876-107-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/3876-76-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/4000-111-0x0000000004BF0000-0x0000000004C12000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/4000-148-0x0000000007630000-0x0000000007CAA000-memory.dmp

                                                  Filesize

                                                  6.5MB

                                                • memory/4000-109-0x00000000025F0000-0x0000000002626000-memory.dmp

                                                  Filesize

                                                  216KB

                                                • memory/4000-135-0x0000000006220000-0x0000000006252000-memory.dmp

                                                  Filesize

                                                  200KB

                                                • memory/4000-151-0x0000000007260000-0x00000000072F6000-memory.dmp

                                                  Filesize

                                                  600KB

                                                • memory/4000-136-0x00000000744E0000-0x000000007452C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4000-146-0x0000000006280000-0x000000000629E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/4000-152-0x0000000007190000-0x00000000071A1000-memory.dmp

                                                  Filesize

                                                  68KB

                                                • memory/4000-147-0x0000000006F00000-0x0000000006FA3000-memory.dmp

                                                  Filesize

                                                  652KB

                                                • memory/4000-150-0x0000000007000000-0x000000000700A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/4000-112-0x0000000005590000-0x00000000055F6000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/4000-113-0x0000000005600000-0x0000000005666000-memory.dmp

                                                  Filesize

                                                  408KB

                                                • memory/4000-125-0x0000000005C80000-0x0000000005CCC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4000-123-0x0000000005670000-0x00000000059C7000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/4000-124-0x0000000005C30000-0x0000000005C4E000-memory.dmp

                                                  Filesize

                                                  120KB

                                                • memory/4000-149-0x0000000006FD0000-0x0000000006FEA000-memory.dmp

                                                  Filesize

                                                  104KB

                                                • memory/4000-110-0x0000000004EC0000-0x000000000558A000-memory.dmp

                                                  Filesize

                                                  6.8MB

                                                • memory/4132-1056-0x0000000075490000-0x0000000075607000-memory.dmp

                                                  Filesize

                                                  1.5MB

                                                • memory/4360-254-0x00000000744E0000-0x000000007452C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4528-1045-0x00000000700A0000-0x00000000700EC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4652-264-0x00000000744E0000-0x000000007452C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4716-53-0x0000000000401000-0x000000000040B000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/4716-52-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/4716-84-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/4756-513-0x0000000007510000-0x0000000007521000-memory.dmp

                                                  Filesize

                                                  68KB

                                                • memory/4756-499-0x0000000005A50000-0x0000000005DA7000-memory.dmp

                                                  Filesize

                                                  3.3MB

                                                • memory/4756-512-0x0000000007220000-0x00000000072C3000-memory.dmp

                                                  Filesize

                                                  652KB

                                                • memory/4756-502-0x00000000700A0000-0x00000000700EC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4756-501-0x0000000005F90000-0x0000000005FDC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/4796-1034-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/4796-1002-0x0000000000400000-0x0000000000419000-memory.dmp

                                                  Filesize

                                                  100KB

                                                • memory/5032-275-0x0000000075490000-0x0000000075607000-memory.dmp

                                                  Filesize

                                                  1.5MB