Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 10:10

General

  • Target

    9bb4d5e852f4f0e8dafc9fa5d996814b72fbf55fbc4c073b180256b253dd28fe.exe

  • Size

    1.7MB

  • MD5

    d860115954d36fe32bdf282f58920d4a

  • SHA1

    9debe32061f407ed9763fdde46baeef949cdbd6a

  • SHA256

    9bb4d5e852f4f0e8dafc9fa5d996814b72fbf55fbc4c073b180256b253dd28fe

  • SHA512

    d5ef6ddaf01dcae2e90e6c98456faababb3cc19ec46c129bedfe41871220cd2390cdf9c313635f1dd41e6c87e8cf56a3461e21fbaeb237427c261d69e00a5110

  • SSDEEP

    24576:+yCl6y+0QBGvV1IzDRUCW7oSVbedySGCsSr00DyvAnwMy7FTfnPve7c+BYhzuu8W:NClZHQB2VWn6esayStzmsyh7PGmEhD

Malware Config

Extracted

Family

redline

Botnet

homed

C2

109.107.182.133:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Mystic stealer payload 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bb4d5e852f4f0e8dafc9fa5d996814b72fbf55fbc4c073b180256b253dd28fe.exe
    "C:\Users\Admin\AppData\Local\Temp\9bb4d5e852f4f0e8dafc9fa5d996814b72fbf55fbc4c073b180256b253dd28fe.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yS3wG58.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yS3wG58.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bv6ZN30.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bv6ZN30.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:428
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eM2di66.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eM2di66.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:688
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ow9aO73.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ow9aO73.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1456
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\pd5hR13.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\pd5hR13.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:3308
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1LR84Fz0.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1LR84Fz0.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4104
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4992
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2VE7867.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2VE7867.exe
                7⤵
                • Modifies Windows Defender Real-time Protection settings
                • Executes dropped EXE
                • Windows security modification
                • Suspicious behavior: EnumeratesProcesses
                PID:3392
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3pR15AD.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3pR15AD.exe
              6⤵
              • Executes dropped EXE
              PID:3960
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Cb753Es.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Cb753Es.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4080
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              6⤵
                PID:4984
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:1924
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5bn5cH3.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5bn5cH3.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4580
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:2476
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6lQ9rf3.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6lQ9rf3.exe
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2424
            • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
              "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              PID:4948
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
                5⤵
                • Creates scheduled task(s)
                PID:1364
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
                5⤵
                  PID:4048
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4000
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "explothe.exe" /P "Admin:N"
                      6⤵
                        PID:1100
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "explothe.exe" /P "Admin:R" /E
                        6⤵
                          PID:3640
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          6⤵
                            PID:4700
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\fefffe8cea" /P "Admin:N"
                            6⤵
                              PID:4936
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\fefffe8cea" /P "Admin:R" /E
                              6⤵
                                PID:2744
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7Md3PQ81.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7Md3PQ81.exe
                        2⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        PID:2300
                        • C:\Windows\system32\cmd.exe
                          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\54B7.tmp\54B8.tmp\54B9.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7Md3PQ81.exe"
                          3⤵
                            PID:4400
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
                              4⤵
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:1188
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x84,0x174,0x7ffb071146f8,0x7ffb07114708,0x7ffb07114718
                                5⤵
                                  PID:2400
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
                                  5⤵
                                    PID:4980
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:3
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4336
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:8
                                    5⤵
                                      PID:1052
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                                      5⤵
                                        PID:3480
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                                        5⤵
                                          PID:4464
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:1
                                          5⤵
                                            PID:4296
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:1
                                            5⤵
                                              PID:4100
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:1
                                              5⤵
                                                PID:5208
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5680 /prefetch:8
                                                5⤵
                                                  PID:6036
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:8
                                                  5⤵
                                                    PID:4992
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:8
                                                    5⤵
                                                      PID:916
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:1
                                                      5⤵
                                                        PID:5364
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:1
                                                        5⤵
                                                          PID:5204
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:1
                                                          5⤵
                                                            PID:4400
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:1
                                                            5⤵
                                                              PID:4580
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,17096913754616965977,9183705355016005466,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:2
                                                              5⤵
                                                                PID:1672
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/
                                                              4⤵
                                                                PID:4920
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb071146f8,0x7ffb07114708,0x7ffb07114718
                                                                  5⤵
                                                                    PID:4500
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,15877087768598167453,3202693807142329061,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
                                                                    5⤵
                                                                      PID:3284
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,15877087768598167453,3202693807142329061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:3
                                                                      5⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:728
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                                                    4⤵
                                                                      PID:396
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x154,0x170,0x7ffb071146f8,0x7ffb07114708,0x7ffb07114718
                                                                        5⤵
                                                                          PID:3320
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,10000510146819633145,7192270706479772000,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:2
                                                                          5⤵
                                                                            PID:2456
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,10000510146819633145,7192270706479772000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:3
                                                                            5⤵
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:1944
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c regini "C:\Users\Admin\AppData\Roaming\random_1712052802.txt"
                                                                    1⤵
                                                                    • Suspicious use of WriteProcessMemory
                                                                    PID:2692
                                                                    • C:\Windows\system32\regini.exe
                                                                      regini "C:\Users\Admin\AppData\Roaming\random_1712052802.txt"
                                                                      2⤵
                                                                        PID:1784
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:3836
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:4080
                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                          1⤵
                                                                            PID:5148
                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                            1⤵
                                                                              PID:2128
                                                                            • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:6056
                                                                            • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:4760

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\41787c45-279a-439e-af12-0153c3624a52.tmp

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              550b66d85da608e6e87825ab5a6d238f

                                                                              SHA1

                                                                              be2dd0eaf485a209bdc8fa8354b1b89531466a5d

                                                                              SHA256

                                                                              d9bf54be5ec481e9d164226d15fc7e1e47bca6595da23545a65e6618c43da149

                                                                              SHA512

                                                                              0b91e89c450cc772629819dde015c611365d2cb294bd26896d76efa5fe2c2bed1e0516a23e2dc22aba30409b07b27b8794c23c2d612cba956593f03a70700cc5

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              cbec32729772aa6c576e97df4fef48f5

                                                                              SHA1

                                                                              6ec173d5313f27ba1e46ad66c7bbe7c0a9767dba

                                                                              SHA256

                                                                              d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e

                                                                              SHA512

                                                                              425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              279e783b0129b64a8529800a88fbf1ee

                                                                              SHA1

                                                                              204c62ec8cef8467e5729cad52adae293178744f

                                                                              SHA256

                                                                              3619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932

                                                                              SHA512

                                                                              32730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              b7e32679ccaa72697db5b808a105a92b

                                                                              SHA1

                                                                              56d736bd86f9970feb8de6a3a79c3fc1ea3bf1ee

                                                                              SHA256

                                                                              1ee14bdf80d3d7252e5fc9b0c60ab4cad7eb3d3d4550e829c593c4ab32bc01fb

                                                                              SHA512

                                                                              9f573c44edbcde167601d358417843ae8d943da34c1506b09a8604841e1ec378484035f06a71e54b85f1bddd18401053ca8443b951090574ac7df6a4a6c02fd7

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              b868f49a581c5a3829b4a14fe81f44fb

                                                                              SHA1

                                                                              a0a21ce42a4af982f0e7105cc2481574d8d7956a

                                                                              SHA256

                                                                              4a1cec8f52dafd5224ba409a2c774c796dfa4e11a74f3ae86924ea688efde90f

                                                                              SHA512

                                                                              dfba14a4f6f68c0cde18976a77dbb1e3ecfb9bd4b628a5b803909cbaeac5c915042dd78bd08d50a2a9ee36eb36f9589641e675cd85a0f89810ec64c7cbbdbf59

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              da1f5970a8f8e90c44a67f21aa5d2a60

                                                                              SHA1

                                                                              4c79d07a4374e94905107531c2d95f71228c010d

                                                                              SHA256

                                                                              3e590a396ea27bfc07f91222774437999644cdfde35d6489d0437e0b736ad1d3

                                                                              SHA512

                                                                              a8ff888a65911e9e32fc845b082bc24359544b990e42d2997e076954d433bb24e425675b36a752512e428d0f15189c1ed3f3203a68e9b5d48554991cafc88924

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              7KB

                                                                              MD5

                                                                              eb8c4573f3a7e4e57645a000d122a254

                                                                              SHA1

                                                                              af7350fe28855625770f0e3e751f83be53df315c

                                                                              SHA256

                                                                              357f6303b928d7d96dee2d8610b6d07d082b3cd594de14f42ae2d5730db2fe3d

                                                                              SHA512

                                                                              8f8608a83d2333f093871b6af517b34fbf227e2b0371d0ba98a6cac83f3692e86eb2a33ba1f346f22374bc70c6721c3fa4825d100249b80cc430550610ea8db1

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              e5801da7b9aa51f41f1e3b5657d869f7

                                                                              SHA1

                                                                              e1a8a7e5523c3cce3fc9dfa8ede2524f3675d54a

                                                                              SHA256

                                                                              14fc3da0c5b016bb10e7511479301763dad0fb3b6e8754b7d58f28c1cd15f406

                                                                              SHA512

                                                                              6c591444d57d7bb241d7c1a702223e9943445be0404e82c095337203afc39e5d955794ef8a7fce5b2743e67fa4df544f1fe0754d567a8ff98410753fccb23e50

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                              Filesize

                                                                              89B

                                                                              MD5

                                                                              096c5dbfad783ee534d9b6e31727c565

                                                                              SHA1

                                                                              1d6ba2fbae81974ccf101c45460b995b05a527bc

                                                                              SHA256

                                                                              e567c9b27cdb34a6f8eb044e9715709180b76735b8ee00551272dcc8d6aa504a

                                                                              SHA512

                                                                              f01071999795e6e8a77214ed14e4d6effb428e263e2a481d9bca8ce1404ceda1e5b7cbdf85bf558006a2258a003665872cbb8b8fc360848734f1d8fc7bbf1b90

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                              Filesize

                                                                              146B

                                                                              MD5

                                                                              76256e4f63961b0c81f3c54903a90b7f

                                                                              SHA1

                                                                              d9d3ee96feaf38ac7941dfb3912ee5ec7557d34d

                                                                              SHA256

                                                                              1c5e46c0837c34f6c1f901562a90d596264f80cb390bb7f418e12e009eaa0c4d

                                                                              SHA512

                                                                              3aef81951d93640941184f9ee51eb224d32576980682aba6ec3ba5729be0a1511131030530eeffb789b6adf773010207a15e5154d79f7f631ce43ac2ac95a647

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                              Filesize

                                                                              82B

                                                                              MD5

                                                                              b6eee9e388e02f27884c03a50289d346

                                                                              SHA1

                                                                              f6756ba85f70821c73c99b7336041ada465f351b

                                                                              SHA256

                                                                              ed809129dbd8ba847535c99e6abed29e15b12f020d2ea123bbf8f9bb6524822c

                                                                              SHA512

                                                                              e9b3edbe41549280cc8861d0614bf17377e9498f32f3ee8b7fac14517c70c61def2ca55d99a9a60f95787c5c58167c21ff1ff66834d7edb36458ccbf710956c3

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              46295cac801e5d4857d09837238a6394

                                                                              SHA1

                                                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                              SHA256

                                                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                              SHA512

                                                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                              Filesize

                                                                              72B

                                                                              MD5

                                                                              e6bc670d2ed4557f1324fd66f79b059e

                                                                              SHA1

                                                                              f1f771647b9be8aff3189cc91f1f234d5085cf08

                                                                              SHA256

                                                                              daee370017a7ad204250a04f9a29253fbb187b3a9b6694bddbddc5982241bd04

                                                                              SHA512

                                                                              f3528e719e8aa72c2c72ff3b71d251ae4563253142faed1d7ac5c75e81e0860933ff927cc21f189373dbb163b512089ea010e33efa8031aafd35d1b93706f056

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57bda3.TMP

                                                                              Filesize

                                                                              48B

                                                                              MD5

                                                                              c51ccde0ea7cee612925f8f92a00ef88

                                                                              SHA1

                                                                              65aa7e1448d6fab1485f9c5846f7a3c0ac530bb6

                                                                              SHA256

                                                                              07f9de59fe03cdceb49b08c6052aa53f006348a723e01ae0b3fe8bb80d7c1ab9

                                                                              SHA512

                                                                              a7167dfcb0a2f1c3aed991c4e4203466ec4cac67ac53e4d85ad7438da4aa9b331ea7014ac5ffc012cc7d26d4c5393a833de5037fa266dd424a9775350afa2356

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              8a86a31cc70f677284918daf73bfc991

                                                                              SHA1

                                                                              f488ffcccb0fe3211989c5bceb230236bcfb5dcf

                                                                              SHA256

                                                                              947406c088826cbcea86aa97c57e32b8838af2b7179418b8b138578834394ca2

                                                                              SHA512

                                                                              797d215fdfd64449f8aad835069f27b02685f9ebb589986f4bcbb8d8c52f4b1b8476e67de8ddab07ad3a8102b5d0e471688efb241d30bb26b8d2d173b29da5a0

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              4a0ca6f208a7a2433f7c64580237efc3

                                                                              SHA1

                                                                              4a5c20c1985bfe731fabeda8535cdd8bbbd3aa90

                                                                              SHA256

                                                                              5bc32402e5d8cbb375cd859ac6f73f35535f78c0e6898d1b3fc1f38dc4bbbdf3

                                                                              SHA512

                                                                              051625d47ca311b3ef96f5f609be1eca48c69746c991fc0e903e09e1c8017e7e990c8b7f4b8f785f9942affd8d358ffbc752654d3a8a521a6f794de6c4860e6a

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              c48c355f0e1cface53c5e663d5e13414

                                                                              SHA1

                                                                              14c2d12695dcc8c3638384a058e3a7a3c4939978

                                                                              SHA256

                                                                              fd6b8cf0f23f219e9cb32a2ac337a6b40c5a79d2268d57cc953c761caa80e8c2

                                                                              SHA512

                                                                              a6f2df57200efeec9e82e1e344b2c70d857ad33965380412f625c128965acf3a2c62b9e70c8d51ff16fc3ccd544577bf468456caaed814318315ade170ad185c

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57b66f.TMP

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              3a092d802cc58990e392a6d64aa7dc0f

                                                                              SHA1

                                                                              55e872f029999178790ca1a3f910876f4dee2c1b

                                                                              SHA256

                                                                              7a53aa437dcba1411af1562f2881f237912107a347aefbd16a070b828d691f6d

                                                                              SHA512

                                                                              43a52d5baa3535967a719e776374291d8a9fd36b55edd6beb8db04b5c6d916dca6741192e5792a64393f683f679c30dbd662b9970a09f1e05c8327460573e32a

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              6752a1d65b201c13b62ea44016eb221f

                                                                              SHA1

                                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                              SHA256

                                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                              SHA512

                                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              096fb2fe7b958864ba81471534eb48c6

                                                                              SHA1

                                                                              3ad5b4714a5a8618d657beb781ca2353e0a21c31

                                                                              SHA256

                                                                              d99ef49422719055f562b445fc0e2941fd9d2a12d0771e0f30fa26c9addc1d5b

                                                                              SHA512

                                                                              8e1d957285f6f98defa2a49073ac9c52f9ce5cccee6b0015bf8cf63b0583a698a34f210ae3668b06f39705bd1b6278d2c81b3e106673a5ceaf88b10908cc9344

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              54c6f860e438f93387840dda83ffe993

                                                                              SHA1

                                                                              ce347f22e2223c7818ff5e589bcaa7307d119463

                                                                              SHA256

                                                                              6f1df426c3a0cd77428d4ac901e831cafe7f404f9ea3ebe5203ae6f0c1ec07f8

                                                                              SHA512

                                                                              ad8fae7b6cda2dc58362aafc573f7e28102a05004c3c58d366e86ceed5299f3f667fe66d120392fd72eff3344e1ea46bf3ef445f82b1a983021cd5cbf7e2dc99

                                                                            • C:\Users\Admin\AppData\Local\Temp\54B7.tmp\54B8.tmp\54B9.bat

                                                                              Filesize

                                                                              124B

                                                                              MD5

                                                                              dec89e5682445d71376896eac0d62d8b

                                                                              SHA1

                                                                              c5ae3197d3c2faf3dea137719c804ab215022ea6

                                                                              SHA256

                                                                              c3dea90ca98985007f0de66bf0197fdcd2d4a35e365135bf37a18a4895d81668

                                                                              SHA512

                                                                              b746b79120d2ff8a9f3327b0bed99c70339155ea831c1eb9f412056fc8de36a0e3005378ba9102bd25ce6cc24fe1171f1a9c8453f33a9bcd6dd59e9ad0f8e186

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7Md3PQ81.exe

                                                                              Filesize

                                                                              45KB

                                                                              MD5

                                                                              6b7a8ac605de29c5c0b7716a19482732

                                                                              SHA1

                                                                              933e9f8614269476ecaa9caa367829f5f21769b2

                                                                              SHA256

                                                                              b11444f57d40b125631e355aa89e6a34a19e4c074706a4a08af03fa3ec35dca8

                                                                              SHA512

                                                                              d642ec237e4b786743c17c78b735ea1030081cc6022efaf90d1438787fdf57213183fc7472e390bda244b07bc5927ff6d20b15403ab6974b62993c946ef67d96

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yS3wG58.exe

                                                                              Filesize

                                                                              1.6MB

                                                                              MD5

                                                                              88acc57952a9b2f6b6004380dd7b051d

                                                                              SHA1

                                                                              ea9be2f253dc850fceb183b48b99400730d2b92b

                                                                              SHA256

                                                                              3e6810257ed101452fb6325bce483df4ac384d9c6f807f1a740232d340b683b2

                                                                              SHA512

                                                                              3d41d02b6708be684eab5e266e158cc4e34725e1d167b2ce4d8e5fece00c0e3ced07365724ed75948283651ea6c1dfa41d654f328e34343fb6e6196012e97f27

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6lQ9rf3.exe

                                                                              Filesize

                                                                              219KB

                                                                              MD5

                                                                              4bd59a6b3207f99fc3435baf3c22bc4e

                                                                              SHA1

                                                                              ae90587beed289f177f4143a8380ba27109d0a6f

                                                                              SHA256

                                                                              08e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236

                                                                              SHA512

                                                                              ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bv6ZN30.exe

                                                                              Filesize

                                                                              1.4MB

                                                                              MD5

                                                                              20fd96fae3fb8118b0fb6ff7b60e6cb8

                                                                              SHA1

                                                                              c9d9dffaeeee9910a1daf2555a59009519328cd3

                                                                              SHA256

                                                                              7de3b76436284dad4dea66e3a0cdbff0b472027cfdf0a3b12963a875b6522d1b

                                                                              SHA512

                                                                              04c0c07ed9230c1b175e2caa88abd3af5067e581cd6e97041a4973ca15fbe1d59af34611e112761c66bfa73152e1f2312f66af3def517d07df1b92d37aaa2d83

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5bn5cH3.exe

                                                                              Filesize

                                                                              1.1MB

                                                                              MD5

                                                                              f66e9966806ae7cdade4ee238dc29133

                                                                              SHA1

                                                                              425fac3a277102a565246ed6f6f682ee5da452ad

                                                                              SHA256

                                                                              2bee4a29d651b044d35e60530533ffbec58eb99a259458317af6f02ed22e78ee

                                                                              SHA512

                                                                              1ac7b35a56cf1e792abb35f87c04b5ab11e2f8c22f30fc73ede17dec9890452706e8a3f471a6954a0453f3e932aca2f1c9af9300fa2bcdbc5bb3b3b169f6b43f

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\eM2di66.exe

                                                                              Filesize

                                                                              1.0MB

                                                                              MD5

                                                                              e422d0edcef6d3b5281f4058f2e26b9a

                                                                              SHA1

                                                                              6303a61cd41e1d66219c5df18303c9ccf9c69817

                                                                              SHA256

                                                                              490155233337bf3674644abdebc8dfa24e5dcecbf549cfbb7beb28c9a907fa54

                                                                              SHA512

                                                                              8ce9c0a6b809a212ead16fb92587f9bd9888dba7e8fee3e71fe9bbc61cb41b640d76a4427bd5df58583cd3a0fb9e2ecc329cfa3adb066a1c8b730b75b4d5add6

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Cb753Es.exe

                                                                              Filesize

                                                                              897KB

                                                                              MD5

                                                                              85d59343f6cf77a4db75bb3d83af5ac9

                                                                              SHA1

                                                                              37400c4b27b9a2e91dd267d53142eee9404c9c44

                                                                              SHA256

                                                                              53991ef22ac1b66248f13ab163b5a1b9834c1a7c42c06a7d2e197b6a613b8282

                                                                              SHA512

                                                                              3aa7aa0c6989954a07b91c0c681c7a65d9d61c80a2eaa7747d6c322b91a4f012a0541f622cbbfaba3ec8311e4a34c419255419510bc4d820e22a17872a3c7645

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ow9aO73.exe

                                                                              Filesize

                                                                              688KB

                                                                              MD5

                                                                              781ccb934a1a8547c0cd03a552107c6e

                                                                              SHA1

                                                                              278e5f17dfa290711d1bfe4855556471c035670e

                                                                              SHA256

                                                                              9a6f25a90dd25d943fb812abb8539af91e1f33c0a0fbb7a78d8aebeac9086d1c

                                                                              SHA512

                                                                              a909388d733bf1555917665f4809c6691c6d4f31ad1bdd590ac103feaa0890556c5c400e847d4d1781b919ceec839995791500506f2867dd9b0040f5c13850c7

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3pR15AD.exe

                                                                              Filesize

                                                                              180KB

                                                                              MD5

                                                                              0635bc911c5748d71a4aed170173481e

                                                                              SHA1

                                                                              6d92ff8b519e4a10759f75f3b3d9e1459ed4ff1b

                                                                              SHA256

                                                                              a0330d75df7075206cf68d358e3acfc621062f35db43c2521b8ef5e7c9f317f1

                                                                              SHA512

                                                                              50ea5d41497884b8aee43d6d7940186d6095055c4cd301ffa88407caf9935853dcfd852e81ab4671da21505ba284b0bae71a59fa50dd55dfa4c3ea7d0251651a

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\pd5hR13.exe

                                                                              Filesize

                                                                              492KB

                                                                              MD5

                                                                              4750a3181353b6184fda9b65f8ebe5b3

                                                                              SHA1

                                                                              bbb84b5fbf7cfd721d948534de6c83eba9c68966

                                                                              SHA256

                                                                              1c59399c42745f06ce7b31e5e12d419e66b0b7e1accefb8b8aba1e1e6ed625eb

                                                                              SHA512

                                                                              a80e90abed4d116b252135ed217f22b62568e6d4a626004b56cc24f45338acf75c406ad2b61801d08d816285138d197b1a60b8c50e87cbb6f6d3790ab1e51886

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1LR84Fz0.exe

                                                                              Filesize

                                                                              875KB

                                                                              MD5

                                                                              73d86751a127f28504b4239773c328be

                                                                              SHA1

                                                                              a7b5a37edc0841e9a269b827bb0bf28ae0d8c330

                                                                              SHA256

                                                                              e0923f519bbf0f9c43922d26954359eed1c352db6deda6e655f838a44d655030

                                                                              SHA512

                                                                              464df937ab7ed3a7af81f18d5238019b4268a78dfd8b9d0df6a459c5fd19dfa480c441ce2f20f8b63dcba806e6fc646beaa6b778b52fedee7077739634bad3e0

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2VE7867.exe

                                                                              Filesize

                                                                              265KB

                                                                              MD5

                                                                              15fe972bcfd9189d826083838645b850

                                                                              SHA1

                                                                              d2bf7fee68e358fa71b942b8ae92e483536abf86

                                                                              SHA256

                                                                              ec739f26f487bcc65718bb8c28a5e3adf817a18e01952bd888f618a57c1e61d4

                                                                              SHA512

                                                                              30f7c8daa78ba9bb32d5dca56440fd9b1d36336f496521920ab41737787c1c8e0bcdd714b72249e0ab52908d7918afcaf9e0b3f5ba2a8a2888e9adb538810cfe

                                                                            • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                              Filesize

                                                                              162B

                                                                              MD5

                                                                              1b7c22a214949975556626d7217e9a39

                                                                              SHA1

                                                                              d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                                              SHA256

                                                                              340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                                              SHA512

                                                                              ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                                            • C:\Users\Admin\AppData\Roaming\random_1712052802.txt

                                                                              Filesize

                                                                              78B

                                                                              MD5

                                                                              2d245696c73134b0a9a2ac296ea7c170

                                                                              SHA1

                                                                              f234419d7a09920a46ad291b98d7dca5a11f0da8

                                                                              SHA256

                                                                              ed83e1f6850e48029654e9829cbf6e2cdff82f55f61d1449f822e448f75e8930

                                                                              SHA512

                                                                              af0b981ef20aa94aff080fbd2030556fe47c4cc563885b162e604f72bc70c4a0eee4ee57ce4ea8964e6363a32ba34f8bee933db30d3d61392c42299621a4fc79

                                                                            • memory/1924-56-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/1924-85-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/1924-55-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/2300-108-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                              Filesize

                                                                              120KB

                                                                            • memory/2300-81-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                              Filesize

                                                                              120KB

                                                                            • memory/2476-383-0x00000000079B0000-0x00000000079C0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2476-76-0x00000000079B0000-0x00000000079C0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2476-87-0x0000000008830000-0x0000000008E48000-memory.dmp

                                                                              Filesize

                                                                              6.1MB

                                                                            • memory/2476-89-0x0000000007950000-0x0000000007962000-memory.dmp

                                                                              Filesize

                                                                              72KB

                                                                            • memory/2476-92-0x0000000007AF0000-0x0000000007B3C000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/2476-373-0x0000000073C50000-0x0000000074400000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/2476-60-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                              Filesize

                                                                              248KB

                                                                            • memory/2476-90-0x0000000007AB0000-0x0000000007AEC000-memory.dmp

                                                                              Filesize

                                                                              240KB

                                                                            • memory/2476-77-0x0000000007870000-0x000000000787A000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/2476-88-0x0000000008210000-0x000000000831A000-memory.dmp

                                                                              Filesize

                                                                              1.0MB

                                                                            • memory/2476-68-0x0000000007790000-0x0000000007822000-memory.dmp

                                                                              Filesize

                                                                              584KB

                                                                            • memory/2476-67-0x0000000007C60000-0x0000000008204000-memory.dmp

                                                                              Filesize

                                                                              5.6MB

                                                                            • memory/2476-63-0x0000000073C50000-0x0000000074400000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/3540-83-0x0000000002690000-0x00000000026A6000-memory.dmp

                                                                              Filesize

                                                                              88KB

                                                                            • memory/4992-157-0x0000000073C50000-0x0000000074400000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/4992-47-0x0000000073C50000-0x0000000074400000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/4992-42-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                              Filesize

                                                                              40KB