Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 10:38

General

  • Target

    0d5168a6e44940ea7f1cb2dc06698783e7e987b82ba1c25c333279001b78ad57.exe

  • Size

    1.6MB

  • MD5

    6b6f9e49181e1d03f78509aff32e0baf

  • SHA1

    86ba4bc261b4a51042098accc67272b3a7b29761

  • SHA256

    0d5168a6e44940ea7f1cb2dc06698783e7e987b82ba1c25c333279001b78ad57

  • SHA512

    2ec00bc01b105676607abd978e060cb44ba7a84261689181bdb137246998b76f0c7d067dc0cd65dd89987ef9c67d2fa4554f73142efc5f13405302eb2eb892fb

  • SSDEEP

    49152:psD5WlljuPP+ZhBIgv2ldONz5DvLFETghmyN/Il0TF:ygZUgOrONBTsyNgl0

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Mystic stealer payload 5 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d5168a6e44940ea7f1cb2dc06698783e7e987b82ba1c25c333279001b78ad57.exe
    "C:\Users\Admin\AppData\Local\Temp\0d5168a6e44940ea7f1cb2dc06698783e7e987b82ba1c25c333279001b78ad57.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vy0oJ44.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vy0oJ44.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN8bb19.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN8bb19.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WP2gn59.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WP2gn59.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3668
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\TH2qY10.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\TH2qY10.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2100
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\IM7YC38.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\IM7YC38.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1936
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Uf70YP5.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Uf70YP5.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2188
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2920
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2QM7584.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2QM7584.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3604
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:3496
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 540
                      9⤵
                      • Program crash
                      PID:3160
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3hd09hY.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3hd09hY.exe
                6⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                PID:4444
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Tc192Ss.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Tc192Ss.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4028
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                6⤵
                  PID:4964
            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5hZ3pY2.exe
              C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5hZ3pY2.exe
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:3148
              • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"
                5⤵
                • Checks computer location settings
                • Executes dropped EXE
                PID:2152
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
                  6⤵
                  • Creates scheduled task(s)
                  PID:4216
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
                  6⤵
                    PID:3200
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:3788
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "explothe.exe" /P "Admin:N"
                        7⤵
                          PID:2956
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "explothe.exe" /P "Admin:R" /E
                          7⤵
                            PID:4700
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            7⤵
                              PID:4832
                            • C:\Windows\SysWOW64\cacls.exe
                              CACLS "..\fefffe8cea" /P "Admin:N"
                              7⤵
                                PID:3584
                              • C:\Windows\SysWOW64\cacls.exe
                                CACLS "..\fefffe8cea" /P "Admin:R" /E
                                7⤵
                                  PID:1736
                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6vF2hB9.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6vF2hB9.exe
                          3⤵
                          • Executes dropped EXE
                          PID:1420
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7bL9gO78.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7bL9gO78.exe
                        2⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        PID:3144
                        • C:\Windows\system32\cmd.exe
                          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\7AAE.tmp\7AAF.tmp\7AB0.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7bL9gO78.exe"
                          3⤵
                            PID:4796
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
                              4⤵
                              • Enumerates system info in registry
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:4108
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffd411946f8,0x7ffd41194708,0x7ffd41194718
                                5⤵
                                  PID:4892
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:2
                                  5⤵
                                    PID:3420
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:3
                                    5⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:964
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:8
                                    5⤵
                                      PID:3468
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
                                      5⤵
                                        PID:1420
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
                                        5⤵
                                          PID:2616
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:1
                                          5⤵
                                            PID:544
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:1
                                            5⤵
                                              PID:1056
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:1
                                              5⤵
                                                PID:5240
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5472 /prefetch:8
                                                5⤵
                                                  PID:6044
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6328 /prefetch:8
                                                  5⤵
                                                    PID:5168
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6328 /prefetch:8
                                                    5⤵
                                                      PID:5208
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:1
                                                      5⤵
                                                        PID:4272
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:1
                                                        5⤵
                                                          PID:2940
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:1
                                                          5⤵
                                                            PID:2540
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:1
                                                            5⤵
                                                              PID:1300
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,10480298332987142635,5242314779217678421,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5140 /prefetch:2
                                                              5⤵
                                                                PID:4824
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/
                                                              4⤵
                                                                PID:4336
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffd411946f8,0x7ffd41194708,0x7ffd41194718
                                                                  5⤵
                                                                    PID:4776
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,18051992651863475095,14594250654197235680,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:2
                                                                    5⤵
                                                                      PID:3912
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,18051992651863475095,14594250654197235680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 /prefetch:3
                                                                      5⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:760
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                                                    4⤵
                                                                      PID:4424
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffd411946f8,0x7ffd41194708,0x7ffd41194718
                                                                        5⤵
                                                                          PID:4656
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16533892524746726073,12885279671463913261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
                                                                          5⤵
                                                                            PID:1520
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16533892524746726073,12885279671463913261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3
                                                                            5⤵
                                                                              PID:4572
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3496 -ip 3496
                                                                      1⤵
                                                                        PID:2524
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:2212
                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                          1⤵
                                                                            PID:5128
                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                            1⤵
                                                                              PID:4672
                                                                            • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:5928
                                                                            • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                              1⤵
                                                                              • Executes dropped EXE
                                                                              PID:3676

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              47b2c6613360b818825d076d14c051f7

                                                                              SHA1

                                                                              7df7304568313a06540f490bf3305cb89bc03e5c

                                                                              SHA256

                                                                              47a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac

                                                                              SHA512

                                                                              08d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              e0811105475d528ab174dfdb69f935f3

                                                                              SHA1

                                                                              dd9689f0f70a07b4e6fb29607e42d2d5faf1f516

                                                                              SHA256

                                                                              c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c

                                                                              SHA512

                                                                              8374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              30c2db5b280f611f4242914b8711f649

                                                                              SHA1

                                                                              2cafc80e062f1f989939fa396dcfaab7c0234fd9

                                                                              SHA256

                                                                              f1ef2e39f1f05055a9b8c5787b4b4cc616a3f0709ed77cc65d97e7ce56046a99

                                                                              SHA512

                                                                              644c7606af7350b7e75702b57983ede7bcd090aa571ada738cd588f109ba995d60a7329ada9bc40c9f81db59f2ca0333129420a1f0673b78e1a984b9aea775c0

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              74416b562fbf770944566f30f7530d5b

                                                                              SHA1

                                                                              4baf489224aa15536db9c8c5426fd630cb64cb30

                                                                              SHA256

                                                                              09245463a063abf59fb407a24612b87a11984a3713ebca91e354879075f2c948

                                                                              SHA512

                                                                              a52b129ef2587fe29780a961e4201c6305cb7a32c43c56e3ea05711653a69b1af13f3dae6d4f373ed80c220b5df50d52356d6d3f019e8ce90a5c7e2c5a1ba3a7

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              1ad5333e76a49b814e0d3c5e706c45ea

                                                                              SHA1

                                                                              3cd2cecbd12b70b59bab9eed44fca4297f662636

                                                                              SHA256

                                                                              8384fd8ec92b0c0298e274db5e7056ba073e1bea43ab34fff185d4f0f735d851

                                                                              SHA512

                                                                              8fa973599092a15abdd0b43a3b2016520a6a680e3b71bcdc7e06505159ec2857e130b05ee278d4e6d563d88d555da66433e14dd77156a69705995d7b19a6fd99

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              7KB

                                                                              MD5

                                                                              efd1340b31772d2fc3ec11526e3c610f

                                                                              SHA1

                                                                              87576e0d017dee70bb657a7fc4306eb04b533cb0

                                                                              SHA256

                                                                              0f04f71d69d4bd015544e763939cfe158d15bc6b798bb2bf9be4da4be8249af3

                                                                              SHA512

                                                                              2ddf8074af7cc5e8eed96d4f521e69717a3bdd92d276461b75848be66e89fa82d0c49a96ed99d041ffb14a171377cbef3381e3eeb6224c97c9795528f7fd30e2

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                              Filesize

                                                                              146B

                                                                              MD5

                                                                              f8c7e68e36d73bcaf72a07bfb3f7615d

                                                                              SHA1

                                                                              3800748eec945d08a89d8ab30bf03777ad5645fd

                                                                              SHA256

                                                                              3174e72187dc33452f2095320fde3082cc2fff5ce108e5dd00fa27e6e8bf719d

                                                                              SHA512

                                                                              60540d1953039ebd250efb651c7583bb01cb7d670588ad2ca87205a2a0219714e6d70951f5905355f7f2b1f95070badefdc8d5a5f91f3c9b44d4acdd3ab40344

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                              Filesize

                                                                              89B

                                                                              MD5

                                                                              5f46240eabec489c7fca0b1b51cef801

                                                                              SHA1

                                                                              327af08b82732e09f7c6ad807216efd85618780f

                                                                              SHA256

                                                                              d4f3adcc2a5aa345d70b050e4f6ed75e821840a836cc32308c0db484a4abbeff

                                                                              SHA512

                                                                              22b6c2e724018c82aa6b6709ff90cc5e967a172e445582280c4ab5723784a52b8f6cefce500ba8ea9a81b9b843aca8cb5f05c78c4def082f02ae463d76e2add1

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                                              Filesize

                                                                              82B

                                                                              MD5

                                                                              a54e7f8b8d4356ba1471a423385e62c1

                                                                              SHA1

                                                                              001f7863d01933a08718ce0d284393d38ceb2f15

                                                                              SHA256

                                                                              143c27ac80f6491dcc61e1bf77b81aea1f944bdf607eebdf0abcf5914f750ab6

                                                                              SHA512

                                                                              48560c8acbc1ba79f728d9a408760dad013970863d887b0e9f68ed6f27d7ca568aec96b1303fa9657ce16a522d3d474620b48acc349d9e330b1c11ab5e3846d6

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              46295cac801e5d4857d09837238a6394

                                                                              SHA1

                                                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                              SHA256

                                                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                              SHA512

                                                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                              Filesize

                                                                              72B

                                                                              MD5

                                                                              439f7e09bb8176e8004577fcd1baf4b1

                                                                              SHA1

                                                                              c9210e4df4a408f81e03c77d1e7363564783b815

                                                                              SHA256

                                                                              653dd21a9da4ad83182eb5e87be036ba2b56c1ccdbf056874f51d261d625c159

                                                                              SHA512

                                                                              29f535ed6644418c7c995d83fdca44e4461d32fbf333708d593ff1c78d5b8b1a940a5b40b363896a08cab860ab920d2b3a70a56f7a564b921ae579385cf999cf

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e918.TMP

                                                                              Filesize

                                                                              48B

                                                                              MD5

                                                                              f3f71916a04339adf80b8cf71108840e

                                                                              SHA1

                                                                              88b4c2a3dcf905b1348e64f6573d13a65bbec452

                                                                              SHA256

                                                                              b13495f061e7d95d736990edb061a709daceae65c9c1e9019cb7c21cc39a9648

                                                                              SHA512

                                                                              72b949cab9940737794256f66a978b7c8d60c255b46373dc100cc1d58bcf5f8a3959c481ad141463a419ce891a4c8afce0ecebc003f0ef9c6fbf3c2c01f58d87

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              10f5cb7a7016267639fd94c6d12ac032

                                                                              SHA1

                                                                              d29fd4aae8939d1c77f93f689d1e45b1c0050116

                                                                              SHA256

                                                                              7459f487b86f4d1f6bd421af86bda5c7c692bc4f4e1d217473dfda5a7cf30fa1

                                                                              SHA512

                                                                              160f6ff1995b97ea8e8bd411586bb58a821f8e3e0bced1097e6430e62e8e5d7fc118d7493f9a9c4fcb87797b18cd6970e2c7b5c8a828201a23d17951b48a8c60

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              e94ad28ccaac662ca67e00168a7c25aa

                                                                              SHA1

                                                                              6e0ef0d7241b7bec39e8c928050f7d31b11f4bbe

                                                                              SHA256

                                                                              2a6763d218f2adeb117affaaf03a34c4afec8ea2216a011abb49c0e2b5b682c5

                                                                              SHA512

                                                                              ab8b0c708d1370d9416ed5b80992fcb20885203cd8d4ef8bad34b4dc199c3eaf50e30e9b62d51f5a4ecf1b9e1b3397f77dfe9144d26ec0e52e75e0d2805cd7f3

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              357766e68b2420f0efaec1d7625a02d3

                                                                              SHA1

                                                                              71187d5b86220eed9faa2d96ae8663e4802f6d16

                                                                              SHA256

                                                                              f76306315de0c0185429b5c7af7b87c0c90bb46385e29ea54346a325b9bc58a9

                                                                              SHA512

                                                                              9cbb8083edf8959586f595e6b16f07c57c12987be72eec751a8bac94df9eeffc4dd417748e053058de506818f279ee45c086457ce4aa93ecf726b12b9878b87b

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57e0ab.TMP

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              aeb15c1475ef152009f0a66c6cf892da

                                                                              SHA1

                                                                              ab1b9be54007ec68ec6efe0776bb8a71f9918f84

                                                                              SHA256

                                                                              4b91f6486b4aed37641ef7d83120c5b330b04137b6b08d794455855a835f83d2

                                                                              SHA512

                                                                              126d1bad01f7d0b83ca12d3569e0ce9b82c2490ebe15de9baf1eb3713d86c81b1fdf7ddc806c135c56c603bfbb5ae86ff52a0a7483b643e429f0258cfaee6eb0

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              6752a1d65b201c13b62ea44016eb221f

                                                                              SHA1

                                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                              SHA256

                                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                              SHA512

                                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              d2acf885e2e5352e92bee29a70a1be14

                                                                              SHA1

                                                                              8daa986c955a71b0ef77c1fa3367e80f5e0a1334

                                                                              SHA256

                                                                              3c8597094d5b1e09d0f1929a852534635a2143040d40d26e962f3dbeed3ee2bd

                                                                              SHA512

                                                                              152534137c7e4c793ab025b462fb87080c7a6e54df684463ead7095c5b9a684bdd858c9fc5a0819b1035c5e5275cc99f01aad97d00e69d4cd6b13893ad18795d

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              8KB

                                                                              MD5

                                                                              d4e383746e22f2de29b1ba2972be5f61

                                                                              SHA1

                                                                              bfb563b9685440a6c9a64f78f41a287fabea37cd

                                                                              SHA256

                                                                              2fd4326d6982364d9076ecdd94a48562a0b1ed926e1066a405e8778213e349db

                                                                              SHA512

                                                                              02d10076d51393f706e09c61effb08d937a4ec4530703a1dd0c31e7fcc9071118e2065ab50862d9a17acf5748e2537fadd80fc25caac0c18565b432a78966e31

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              3d47919a5151343112cd3d8f93870dc7

                                                                              SHA1

                                                                              fe8ae15f9cb4f36ec1bf1a2d22ca9fdc4e9e45ee

                                                                              SHA256

                                                                              68845e9d4f0d8eddc4f100d921829b48493d10c37c8fe7eae841a14676533398

                                                                              SHA512

                                                                              ba148cd4315682bff0c1af1a374a3353c57f68afc3fe14b487be8afa64050b872d486bcdd72df888b16b70f0421e70b8b57f6a825fe1f50fa43682b864a5b100

                                                                            • C:\Users\Admin\AppData\Local\Temp\7AAE.tmp\7AAF.tmp\7AB0.bat

                                                                              Filesize

                                                                              568B

                                                                              MD5

                                                                              bcbb9cb105a5466367c5f6ceb38e614a

                                                                              SHA1

                                                                              be7f3382e1a4a78428c8285e961c65cefb98affb

                                                                              SHA256

                                                                              878c05348c1269420ec01dd070212589b5118eba58a4592f89fc36b2a5860d8d

                                                                              SHA512

                                                                              efed12dc71ded17bde4a2f7849ef77d80db75d29c52351f6338f4a9ab5d8b42ba7b9fdca7eb472866819749587f79eb3c6b73e0398f4813b51f300d9a65b0fbf

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7bL9gO78.exe

                                                                              Filesize

                                                                              87KB

                                                                              MD5

                                                                              e58787a4dfe4cbda82e82e4fc1ac0c0e

                                                                              SHA1

                                                                              5f76c0aa0010032c2d3ee5e4bab7580b30783671

                                                                              SHA256

                                                                              51615e3ade1f0c9163bf808b32ab576cb2f8d494b511c6ecee09315fd8893aa4

                                                                              SHA512

                                                                              c877e497e3a23161d2c3d6ed55b74c510d5075adce5542c9feac9cd7b4de26d8a0a5864caacd8d88349bb229562b14993249d2e85f8a161f3fd24d388779989a

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vy0oJ44.exe

                                                                              Filesize

                                                                              1.4MB

                                                                              MD5

                                                                              1aa3d037076d524ce93aa746f479e953

                                                                              SHA1

                                                                              e57feb2ab32be514ca5ad4df1a7509b93bb6db6a

                                                                              SHA256

                                                                              5eb5df5728cce0fb34e5790b678feea77c4b2dfa522aecfef3f7c738327f4701

                                                                              SHA512

                                                                              c4440e0602910654978423b092dfd25028aded2542f13c1e27bbee6c711f818ab169b893222a1328fa5a35db890604df74a197c551bc41d9328ae9d18b445d94

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6vF2hB9.exe

                                                                              Filesize

                                                                              180KB

                                                                              MD5

                                                                              71e067c58bba188ff6991df61bbd3ed0

                                                                              SHA1

                                                                              94709e42db782e76700fa34606684f8016b9078e

                                                                              SHA256

                                                                              106b06f2f1e28d36ceb766d6738e012952a364be425f117260e1f5a927636b1f

                                                                              SHA512

                                                                              0bab9798913edb20c82271da67f7584aedc59569527bc4ba8d7d7e391b18179ebb7bb7dc7e2d98910a5d3e1bfc209664709fe13dc65426f86b44127959877299

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\aN8bb19.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              13819d2ef8f7f66234cc20afde10443b

                                                                              SHA1

                                                                              a76abcaf910eb169209d9ff651152ef94d4e5525

                                                                              SHA256

                                                                              556d7895f8f90bb287c0fd00eff4a6fd784e21e867d887cd6e89bea9f31ee213

                                                                              SHA512

                                                                              036de462c3851e055123fbcc8bd532ce4eedd154f101267850f7992df0ecac26ccac821004b8493a2408f1de76b4c207e761894f5027e73cd8ee211bd44d6a06

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5hZ3pY2.exe

                                                                              Filesize

                                                                              219KB

                                                                              MD5

                                                                              c0ec4dd9c21915b44f2655e23aa50fd0

                                                                              SHA1

                                                                              e4aa3c023576067ded7515f88e8782eb8a7af614

                                                                              SHA256

                                                                              d84e1f98e3f3d364cb93e6cf4c9b993944be61ec5b674ff157711d11bfcb7191

                                                                              SHA512

                                                                              a28ee2a17e08e995900596fee57a4c2361984e679c9a387735af92dd659b3faa527d8f437d7b3090339047b0e5be777113d9697992ae370567e4216ebb684c8c

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WP2gn59.exe

                                                                              Filesize

                                                                              1.1MB

                                                                              MD5

                                                                              fb9ec67282e955142284a5e26ff34f69

                                                                              SHA1

                                                                              b93d91f57030aa7ebd78c1b9df2e89f3d0aaa274

                                                                              SHA256

                                                                              4ea7cd1e48c4fbf1cb53e1523fa875227d41e8afa4a119e0db532e863c86af0d

                                                                              SHA512

                                                                              22d9b20df0c03e33d2f4a9b0c490d8dee39ff6e6b32fed49ca565f4057885c5e07cdc567c11c997f23c5989f97b3dae5e75b1bb58dc20a7715605f51a53979c5

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4Tc192Ss.exe

                                                                              Filesize

                                                                              1.1MB

                                                                              MD5

                                                                              b0407079529dfd079dfa7804a3b0acf5

                                                                              SHA1

                                                                              a78b6ff0b45ac4386daee3f0f8f764844578f8c3

                                                                              SHA256

                                                                              fc2f73235d5125551906d4c5b962c19276ac46b943fc3575af399aff61759992

                                                                              SHA512

                                                                              825ddac35d142a7afdd4b8e23ea575032ba955863073d6c900359862f3367362c58b5ad31a76182e301abf00ec85924f85d583064b35cf02d5084692744ed93d

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\TH2qY10.exe

                                                                              Filesize

                                                                              682KB

                                                                              MD5

                                                                              76133daf5123d791d05f3d6077b82da8

                                                                              SHA1

                                                                              a49fcda04704afd6308f0a70ecd26bd93e728650

                                                                              SHA256

                                                                              058e376103952b045ff8808c7b8f1a8427a7bb6d0a41247bf40baafd6fc8e31b

                                                                              SHA512

                                                                              845fd4fb3b604d527da5a4fbd829b969e5acd280d3eeadb545325332ed9805ff50578d7ff232e0ee473b6c5115d0a9159d1e9daa67c8852995ed65ce93aa187e

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3hd09hY.exe

                                                                              Filesize

                                                                              30KB

                                                                              MD5

                                                                              4f07adcfc663ae5ee5a051c471666cc2

                                                                              SHA1

                                                                              10c55d117b211a7df58af3b1b6c687d73d8d9297

                                                                              SHA256

                                                                              80f8bf6f0da127882e35d77b5d8a4408db844963d26e479f17f62fef5ea904f3

                                                                              SHA512

                                                                              98727b632863606aa7af8b2dc370f5886e968f3fcd1f9ae13959ef640279ee80c1475473dc3dcc7853236e652e8ec3a03753e3de5247945e57ebb5b1d81fddd3

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\IM7YC38.exe

                                                                              Filesize

                                                                              557KB

                                                                              MD5

                                                                              9886a5b5bb35d2fed26b537659042b18

                                                                              SHA1

                                                                              f0b1a1e7a2c2a4cf28418d0e7c34a9ff65f90c79

                                                                              SHA256

                                                                              f5e0abfbeb3e3787515e17feb68fa7257804b1b13eb93d42f1a19c0034a7be07

                                                                              SHA512

                                                                              459bf851aac4b51d2872b72554f1f146e929cd604fcf9fb02d54f45bfe3b9ce88a07d62bafa9afaf2691ed2b084c29b067aefcc58b2782ea5c45918b2938a158

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1Uf70YP5.exe

                                                                              Filesize

                                                                              886KB

                                                                              MD5

                                                                              8888c49aa48cf0ea1dc2be358624d147

                                                                              SHA1

                                                                              055f7dc5635544ad131cc1331a59e866c9402ff8

                                                                              SHA256

                                                                              1e111d314fae9689d28706c674c71ddaa6d7ecfc4df9d82560b4cc6dcb5a2348

                                                                              SHA512

                                                                              8cb0c17f17baef58112bf01e14242b24ac9e300a0fe6083554b8a4aed029ee7cc7afb174980fec2f782fc2fa1fed5f3d607dac963dc6f4c636c0cf52a8d8e8d2

                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2QM7584.exe

                                                                              Filesize

                                                                              1.1MB

                                                                              MD5

                                                                              efef9300fa83ae3951a85b97a03791bf

                                                                              SHA1

                                                                              f7223b49d8e14c9a0f197a5681f2fc01bf3b5367

                                                                              SHA256

                                                                              98fe1103db4b9754e830af0dec07972af188f84418d0c6ca3f44d97ee3ef249d

                                                                              SHA512

                                                                              4518b8b8d7acbc461f91570f2af7a94c260a9be12c6814c24dbc7ddf6f55dbb81974203249ed61bb7c2334468cd79ef26ad4cd33147a663ddf4aa195c560d9ad

                                                                            • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                                              Filesize

                                                                              162B

                                                                              MD5

                                                                              1b7c22a214949975556626d7217e9a39

                                                                              SHA1

                                                                              d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                                              SHA256

                                                                              340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                                              SHA512

                                                                              ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                                            • memory/2920-163-0x0000000074540000-0x0000000074CF0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/2920-42-0x0000000000400000-0x000000000040A000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/2920-46-0x0000000074540000-0x0000000074CF0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/3496-55-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                              Filesize

                                                                              200KB

                                                                            • memory/3496-47-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                              Filesize

                                                                              200KB

                                                                            • memory/3496-48-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                              Filesize

                                                                              200KB

                                                                            • memory/3496-50-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                              Filesize

                                                                              200KB

                                                                            • memory/3516-56-0x00000000011B0000-0x00000000011C6000-memory.dmp

                                                                              Filesize

                                                                              88KB

                                                                            • memory/4444-57-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/4444-54-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                              Filesize

                                                                              36KB

                                                                            • memory/4964-385-0x0000000074540000-0x0000000074CF0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/4964-71-0x0000000007430000-0x00000000074C2000-memory.dmp

                                                                              Filesize

                                                                              584KB

                                                                            • memory/4964-93-0x0000000007790000-0x00000000077DC000-memory.dmp

                                                                              Filesize

                                                                              304KB

                                                                            • memory/4964-387-0x00000000075B0000-0x00000000075C0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4964-70-0x00000000079E0000-0x0000000007F84000-memory.dmp

                                                                              Filesize

                                                                              5.6MB

                                                                            • memory/4964-69-0x0000000074540000-0x0000000074CF0000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/4964-63-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                              Filesize

                                                                              248KB

                                                                            • memory/4964-81-0x00000000075B0000-0x00000000075C0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4964-87-0x0000000007500000-0x000000000750A000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/4964-88-0x00000000085B0000-0x0000000008BC8000-memory.dmp

                                                                              Filesize

                                                                              6.1MB

                                                                            • memory/4964-90-0x0000000007800000-0x000000000790A000-memory.dmp

                                                                              Filesize

                                                                              1.0MB

                                                                            • memory/4964-91-0x00000000076F0000-0x0000000007702000-memory.dmp

                                                                              Filesize

                                                                              72KB

                                                                            • memory/4964-92-0x0000000007750000-0x000000000778C000-memory.dmp

                                                                              Filesize

                                                                              240KB