Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2024 10:42

General

  • Target

    04428661fa0f0fdab52725224d5e1dca6e612b7dbd26a4f1688045b0c7e0324f.exe

  • Size

    1.3MB

  • MD5

    9e812f3cb3b6bd7057626dc1f8f40df2

  • SHA1

    768b2df69ccd958e0865575e10f42b98bafdba21

  • SHA256

    04428661fa0f0fdab52725224d5e1dca6e612b7dbd26a4f1688045b0c7e0324f

  • SHA512

    69f3903c483f01f1835bf54f52c78c25dc62ca8f24ad3020c754aa44230ac3bc55eeb1c6cec18b7511d23aad33f56ada18ce5875d67b07aa144de9b6013e5156

  • SSDEEP

    24576:uyENvyaKYUdsbl1Vtkig+4xZCUVjjEpB1eA1cOTYDXaVKpHky:9SPjb/8dDMUVjkWvOTYwwH

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://77.91.68.29/fks/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Extracted

Family

amadey

Version

3.89

C2

http://77.91.124.1

Attributes
  • install_dir

    fefffe8cea

  • install_file

    explothe.exe

  • strings_key

    36a96139c1118a354edf72b1080d4b2f

  • url_paths

    /theme/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Mystic stealer payload 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04428661fa0f0fdab52725224d5e1dca6e612b7dbd26a4f1688045b0c7e0324f.exe
    "C:\Users\Admin\AppData\Local\Temp\04428661fa0f0fdab52725224d5e1dca6e612b7dbd26a4f1688045b0c7e0324f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jk4dS63.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jk4dS63.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ik0iS59.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ik0iS59.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qI5yO02.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qI5yO02.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1852
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\qz1Kj77.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\qz1Kj77.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:4840
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1EE79Gx9.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1EE79Gx9.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3856
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                  PID:1588
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  7⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4984
              • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2NB1958.exe
                C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2NB1958.exe
                6⤵
                • Executes dropped EXE
                PID:3224
            • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3hC15ix.exe
              C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3hC15ix.exe
              5⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:2952
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Qt187YU.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Qt187YU.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3940
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              5⤵
                PID:1576
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5cj0UU9.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5cj0UU9.exe
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:5104
            • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
              "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1516
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F
                5⤵
                • Creates scheduled task(s)
                PID:1436
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:3608
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  6⤵
                    PID:3340
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "explothe.exe" /P "Admin:N"
                    6⤵
                      PID:2484
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "explothe.exe" /P "Admin:R" /E
                      6⤵
                        PID:3476
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        6⤵
                          PID:1696
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\fefffe8cea" /P "Admin:N"
                          6⤵
                            PID:396
                          • C:\Windows\SysWOW64\cacls.exe
                            CACLS "..\fefffe8cea" /P "Admin:R" /E
                            6⤵
                              PID:4980
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6wM2wR2.exe
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6wM2wR2.exe
                      2⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:880
                      • C:\Windows\system32\cmd.exe
                        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\448B.tmp\448C.tmp\448D.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6wM2wR2.exe"
                        3⤵
                          PID:2260
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login
                            4⤵
                            • Enumerates system info in registry
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:3504
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc2cb846f8,0x7ffc2cb84708,0x7ffc2cb84718
                              5⤵
                                PID:1996
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:2
                                5⤵
                                  PID:2632
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3752
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2416 /prefetch:8
                                  5⤵
                                    PID:2952
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                                    5⤵
                                      PID:4604
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                                      5⤵
                                        PID:444
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:1
                                        5⤵
                                          PID:5096
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:1
                                          5⤵
                                            PID:3300
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:1
                                            5⤵
                                              PID:3980
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:8
                                              5⤵
                                                PID:5888
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:8
                                                5⤵
                                                  PID:5904
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:1
                                                  5⤵
                                                    PID:5988
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:1
                                                    5⤵
                                                      PID:5996
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5072 /prefetch:8
                                                      5⤵
                                                        PID:2440
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:1
                                                        5⤵
                                                          PID:4196
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:1
                                                          5⤵
                                                            PID:3916
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,14715401477034792456,13655493337976699413,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:2
                                                            5⤵
                                                              PID:1076
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/
                                                            4⤵
                                                              PID:4464
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffc2cb846f8,0x7ffc2cb84708,0x7ffc2cb84718
                                                                5⤵
                                                                  PID:4308
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4844128711104244338,1726198316964381225,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
                                                                  5⤵
                                                                    PID:844
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,4844128711104244338,1726198316964381225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
                                                                    5⤵
                                                                      PID:3192
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                                                    4⤵
                                                                      PID:2040
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x168,0x16c,0x170,0x144,0x174,0x7ffc2cb846f8,0x7ffc2cb84708,0x7ffc2cb84718
                                                                        5⤵
                                                                          PID:1152
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16784503307021509944,2244519427224297275,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
                                                                          5⤵
                                                                            PID:1132
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16784503307021509944,2244519427224297275,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:3
                                                                            5⤵
                                                                              PID:2980
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:1288
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:1844
                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                          1⤵
                                                                            PID:912
                                                                          • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                            1⤵
                                                                            • Executes dropped EXE
                                                                            PID:1892
                                                                          • C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe
                                                                            1⤵
                                                                            • Executes dropped EXE
                                                                            PID:4312

                                                                          Network

                                                                          MITRE ATT&CK Matrix ATT&CK v13

                                                                          Execution

                                                                          Scheduled Task/Job

                                                                          1
                                                                          T1053

                                                                          Persistence

                                                                          Create or Modify System Process

                                                                          1
                                                                          T1543

                                                                          Windows Service

                                                                          1
                                                                          T1543.003

                                                                          Boot or Logon Autostart Execution

                                                                          1
                                                                          T1547

                                                                          Registry Run Keys / Startup Folder

                                                                          1
                                                                          T1547.001

                                                                          Scheduled Task/Job

                                                                          1
                                                                          T1053

                                                                          Privilege Escalation

                                                                          Create or Modify System Process

                                                                          1
                                                                          T1543

                                                                          Windows Service

                                                                          1
                                                                          T1543.003

                                                                          Boot or Logon Autostart Execution

                                                                          1
                                                                          T1547

                                                                          Registry Run Keys / Startup Folder

                                                                          1
                                                                          T1547.001

                                                                          Scheduled Task/Job

                                                                          1
                                                                          T1053

                                                                          Defense Evasion

                                                                          Modify Registry

                                                                          2
                                                                          T1112

                                                                          Impair Defenses

                                                                          1
                                                                          T1562

                                                                          Disable or Modify Tools

                                                                          1
                                                                          T1562.001

                                                                          Discovery

                                                                          Query Registry

                                                                          3
                                                                          T1012

                                                                          System Information Discovery

                                                                          4
                                                                          T1082

                                                                          Peripheral Device Discovery

                                                                          1
                                                                          T1120

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                                                            Filesize

                                                                            152B

                                                                            MD5

                                                                            279e783b0129b64a8529800a88fbf1ee

                                                                            SHA1

                                                                            204c62ec8cef8467e5729cad52adae293178744f

                                                                            SHA256

                                                                            3619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932

                                                                            SHA512

                                                                            32730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                                                            Filesize

                                                                            152B

                                                                            MD5

                                                                            cbec32729772aa6c576e97df4fef48f5

                                                                            SHA1

                                                                            6ec173d5313f27ba1e46ad66c7bbe7c0a9767dba

                                                                            SHA256

                                                                            d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e

                                                                            SHA512

                                                                            425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            cf1c652394fd4943204fa8f383fa3d78

                                                                            SHA1

                                                                            8d0623a745a56a0ff76ffdac5835198e709311e8

                                                                            SHA256

                                                                            099ee17f646e3f30020827270f57cb3de6046df5df1313f7b41ad343cebde065

                                                                            SHA512

                                                                            5df012a7fea0ddcd06fbf7d0f6d4422d83da7d92547eea1f8e87e5c4e240007066afc589257d4cdf7083925b8e74f82ca9ddabe6073d32bae2194eaf0e2bd11b

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            ba42de59a2499b4d74e698feac15f112

                                                                            SHA1

                                                                            ce5e3cc42bd06474f4a461b5781e5c65d12109ff

                                                                            SHA256

                                                                            45366e5c42d8735ce13ebd6e85eb876f4b6661b8fcbb1f382e01a69289b4b3a7

                                                                            SHA512

                                                                            374c4a9fa8427666041a65a6b115f871d18f3f2752fd482bf81a9c7edf4e41cef583e0069bd74e5620a82f918fe1b531ecb95b6aee3e3c0c2e06ade7288578dc

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            4ea582efef727889205cfdbee3670432

                                                                            SHA1

                                                                            e1f5d8dd4283eedce68beff0afe8b6cdff368e73

                                                                            SHA256

                                                                            4f51da51108bebef0d2098e1e6f8420bd8631fe9543bb7657a72287380b15e67

                                                                            SHA512

                                                                            f9367e7987322f9de04a2da3ced6498113433606c109e8aa90c89823909e1769adf0f57a7cfe5ccf7f3d721b92cf1f02be10bdc9ba89e7a77782fef2fc7aca29

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                                                            Filesize

                                                                            6KB

                                                                            MD5

                                                                            a821d550791c003d3883a2202d27d410

                                                                            SHA1

                                                                            6716825d04e0d5d91bded6752ab2610219ef7981

                                                                            SHA256

                                                                            42082db72d3e60aa469144fc84366733a036b1b47c3199c98cfb57a743152f47

                                                                            SHA512

                                                                            c2fc027dd3ff8b615c765874386b785a70c2c9e67b67c14699c75799079ff60e81f7d78e976540e0b8a063e0c045c39faf752bbeaad649fef5bb85eece23f4a5

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                                                            Filesize

                                                                            7KB

                                                                            MD5

                                                                            3127a5fe1b1fbbb40b2d68493dfeff24

                                                                            SHA1

                                                                            23ef608808fd5ba92fc674dafbe257b3f936bbe6

                                                                            SHA256

                                                                            b260ce4dc367153cf7766169c47e67d73d5475dda60441350801f4aab5790f25

                                                                            SHA512

                                                                            2d864cba48609396290ef8e19adcec99bb3dfe3554583b24588009b30e98c937732b804719101296530a4d220bb5a59a05246d499d11d5fb178b932e51d42df9

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
                                                                            Filesize

                                                                            89B

                                                                            MD5

                                                                            90b18a381f17003ab6d8ac5f99fdd8cb

                                                                            SHA1

                                                                            be6784a382f4ba1d0c1376538be8561382f3cd63

                                                                            SHA256

                                                                            d4891484cd74417f496c1bca7b5f6d5f0105bfd48f743b9acc3ca705b9b08c19

                                                                            SHA512

                                                                            86af7daab1e5386d17840f6de8c6965496b08889f59f2e8cfd12ae6fde8982396bdbb2d992b0e1af26f83e132bd3d0bdc3dbb5baacd343396994fc427cb127d0

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
                                                                            Filesize

                                                                            146B

                                                                            MD5

                                                                            43ae6da7548902a125630daccf5dd62a

                                                                            SHA1

                                                                            0fbbc641e295acbb685d85338c9c2a49999220d1

                                                                            SHA256

                                                                            c0cfa9e6e2155fa40be9e06d789efdd22c700160cfb719d36e7ad4b07bf90c7f

                                                                            SHA512

                                                                            5e3d9c408f260fc60c7795201cba4fde274d7590d1a213f38ec2081dc41e2610f9b583f76e297bbbde35338a093b5985f7d30074de3762615f7719e0d3e6fd9a

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
                                                                            Filesize

                                                                            82B

                                                                            MD5

                                                                            6ce2302325e4351b336f727d263c4902

                                                                            SHA1

                                                                            f979045d26b4b402b01918994d736b0cd904e07f

                                                                            SHA256

                                                                            c92d383e382854eed25ee5f7b8b554ba076f107f6fe47168b8f995717db7a204

                                                                            SHA512

                                                                            a2475407f9506d97576c83df35edd9a2a490036df3691aa0712b1baa5af552a95fbf8c5db66de73645b167442e3675226caef28d9f5c2e817a1c7fcb45856ec8

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENT
                                                                            Filesize

                                                                            16B

                                                                            MD5

                                                                            46295cac801e5d4857d09837238a6394

                                                                            SHA1

                                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                            SHA256

                                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                            SHA512

                                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
                                                                            Filesize

                                                                            72B

                                                                            MD5

                                                                            a9d7a74427ce73ca19c431e441983d02

                                                                            SHA1

                                                                            136ebbd353dfd1857cb31943f014afaa41ace9a9

                                                                            SHA256

                                                                            86f996c3fd4bdb9dcb2fe9d849938d7decc28afaddc9c456b5ef5b40b6176b88

                                                                            SHA512

                                                                            a8188b385541863ce89e57a663933fcc5f464b62187bea054035d0afcfbba23aee82fdad880117c433b709377474b27e78f734b00dfd95108dcfb152d8bb0034

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57b9ab.TMP
                                                                            Filesize

                                                                            48B

                                                                            MD5

                                                                            66cbdcd16a1a83c98e2b5e5fc647f067

                                                                            SHA1

                                                                            702644b986d6567e8de9ae7810753dcb388b006e

                                                                            SHA256

                                                                            8043a3e1bc0abb7f823592c754a7edc1cb6dd6b7cbbbe0eb040ece22205cc97a

                                                                            SHA512

                                                                            4fba3aa53e6e18eaab28793d451412a4ba6fbb9ce43197ee35e58b9bb875cd8bab51b1ea877fd62368abf6c164df89e4736be1624d57786238fab0645a5dd697

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            776668e8c4b508901b8c82b02e91bcfa

                                                                            SHA1

                                                                            d1464f0a4fc0a8fa56c913ecc6d887d582418553

                                                                            SHA256

                                                                            d2d5a40c267db04fc9aa0d865c3016ba8a4e97d40fd5975fb21e4d329055c4e4

                                                                            SHA512

                                                                            b8a2e5ba4b3fd47e3c953ee5f14bcb3b13ffecf93c81034bd371d2e5731d3db876e7150c853dc07f82d43567a619fa68788e254c5698fde846d4287174690606

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            34c9aa5a87d45b8e294fd169dfd85d2d

                                                                            SHA1

                                                                            859a8629052da658300446384245592cbface049

                                                                            SHA256

                                                                            9175fbca43304b24c905e1d912d6b5b10493ef97883622fcbc5f83eef69b643d

                                                                            SHA512

                                                                            9e41ea486e963230157d7746731259dccb1d3c205f960238b2fb508750a7187969c24bb212c4aeac8933cf3074668c324aa375d66ab69f6b71939cba4cfc1d21

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            684193c06489881612fa11c9cca51bbc

                                                                            SHA1

                                                                            fda197760850857b8b7faf6b49620228763a9837

                                                                            SHA256

                                                                            da94062936b2454524ff71c210a0129141de90e121565207623a1bb0cf1ffc79

                                                                            SHA512

                                                                            ac12f6b102730a423f5a46d7a710f6982a7e6dab3eafdd4a76a40d9e8b284a6f6318356de62cda7b5cbb7b6c057c4614f3d94b852aa3ae4145ad177d00fd3014

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57b20a.TMP
                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            fc98ff21ed465fa6b95de6c952b3f0c2

                                                                            SHA1

                                                                            1f19797fc17f2496edf837a79c16dbb29d165152

                                                                            SHA256

                                                                            2af1b191512199e203e8b0efee79c84a39b7b4c92f9dc0c709de8b792e8fab4d

                                                                            SHA512

                                                                            173e5a64d9116acc866a5231a2ef903dfc2a64d5fb52951d393616e3c94e8c68d22e05ca122d2abdea7d362cafa2612c1c1311cd0b7577b1bc5f53201d6435ba

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
                                                                            Filesize

                                                                            16B

                                                                            MD5

                                                                            6752a1d65b201c13b62ea44016eb221f

                                                                            SHA1

                                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                            SHA256

                                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                            SHA512

                                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            8e4acc89d47c6edfb0330749930ec525

                                                                            SHA1

                                                                            d6e13b392165f54457ddf7a6149814a40abcf223

                                                                            SHA256

                                                                            497d0e22411e4cf06eb97da24e778b0de671ce321b37f17e0abc68b0152c3d30

                                                                            SHA512

                                                                            acbfbe2a7ffc6346df4f2ef4e1e58a98fe006432e5392bebd19a77179eb982b1f23fb782a18aa5fcc240b1cee3bd05061aa5337c872912ba70e35928f29003c4

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                                                            Filesize

                                                                            8KB

                                                                            MD5

                                                                            136e6dbdc80c2757b2232cd7e9814716

                                                                            SHA1

                                                                            0100d1c572b263b730955e0ad734115125592d53

                                                                            SHA256

                                                                            4e3a9dc619bbfdddc2545b3adca1656bb9a4c021b0d864be906b3a5754ae29ec

                                                                            SHA512

                                                                            4f75671bc71327c8b35ea834e7861639c4a6ed829db957911e4e7b12113088596fad658fa8af8a38f90aeb71e3d1de3cfde3179c0f3e5ec1fbbdd93644fd7db0

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                                                            Filesize

                                                                            11KB

                                                                            MD5

                                                                            6e970831c61073deda37687c76573e82

                                                                            SHA1

                                                                            b543bcc3336ba096f2ca26ab7bb50c545a98c0ec

                                                                            SHA256

                                                                            2466538affa9d8fd563674ec20e8560fbd7b06cbe4c2d04f5cd330658da55519

                                                                            SHA512

                                                                            b1a0af3d5440b645c54fed8ffa68f564c06489981105315d8c7fc4361f3915389bbbfe8436a1533d44e80fcc883141b9b2aa48cac6e15a528e4e38fff2ed4dd4

                                                                          • C:\Users\Admin\AppData\Local\Temp\448B.tmp\448C.tmp\448D.bat
                                                                            Filesize

                                                                            568B

                                                                            MD5

                                                                            bcbb9cb105a5466367c5f6ceb38e614a

                                                                            SHA1

                                                                            be7f3382e1a4a78428c8285e961c65cefb98affb

                                                                            SHA256

                                                                            878c05348c1269420ec01dd070212589b5118eba58a4592f89fc36b2a5860d8d

                                                                            SHA512

                                                                            efed12dc71ded17bde4a2f7849ef77d80db75d29c52351f6338f4a9ab5d8b42ba7b9fdca7eb472866819749587f79eb3c6b73e0398f4813b51f300d9a65b0fbf

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\6wM2wR2.exe
                                                                            Filesize

                                                                            87KB

                                                                            MD5

                                                                            c156478ac30551df648dcec6983d346a

                                                                            SHA1

                                                                            0e22d46e3096c9567984a2dff5e6a0788b42892e

                                                                            SHA256

                                                                            1037c68149043bbd84cd329aea94f1b40ea955e9e14cda7b3d724d7581212fdb

                                                                            SHA512

                                                                            c7912c78302936c61c203b41267e96dd93e3707d4deb26fd4579a8ffff929d6b25e3e46958305eccfe3f95f6e9606992ed4ec60b7c457587269cec0196fceff6

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jk4dS63.exe
                                                                            Filesize

                                                                            1.1MB

                                                                            MD5

                                                                            52579e37aaa34ce41bea033cc022f6d9

                                                                            SHA1

                                                                            68b7433eff101182f196f69c4db9aaf776869aff

                                                                            SHA256

                                                                            815f6331b2583f1ef0ceb33877b8375654a74a9598e6112ffc8b7cd7f38a793b

                                                                            SHA512

                                                                            3a8ff3767e5982f7b80f3c26063c98a47467a98edce15b47d75a3033f853c29bf9f7ae6fe2a72d99cda775de7e48f30eaef1b831a9ea0565574228b75e834923

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\5cj0UU9.exe
                                                                            Filesize

                                                                            219KB

                                                                            MD5

                                                                            592fdc333363c213241581b9ace2ce1a

                                                                            SHA1

                                                                            3fcc9c4f49f3b5095fa3130215139b48f318a51f

                                                                            SHA256

                                                                            5596aca585011ae25c053fd1e63a34223f5028b95b30a9d3f208403fa7e6c631

                                                                            SHA512

                                                                            2aa074292014d761dfbee693abb9dcf85001df965ee86ee23383d6ac86d40a9e9c3302b186cf398bd9853b29d1c3d3448be2c8a1cb8df0a3c7be75d5fac75296

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ik0iS59.exe
                                                                            Filesize

                                                                            1000KB

                                                                            MD5

                                                                            e4bae8bbfab0c4652462777f62c53bc5

                                                                            SHA1

                                                                            4ed3dd73dc909cc4f9088e866edd8fb69ad63fdc

                                                                            SHA256

                                                                            5b5673ad664d510b16f8cd52c97666ab3545b87ac0f8c67498bb46798e93877a

                                                                            SHA512

                                                                            1eef3d35b8152766d3c97e9a4822a0af299e786123c096c159c08655ef0509da409544f1ef21b5d0d6fbc15b03bba8b8924c5a6320f9b1d157add522745946dc

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\4Qt187YU.exe
                                                                            Filesize

                                                                            1.1MB

                                                                            MD5

                                                                            31f18bf9fafb9df9d2576f21b839f207

                                                                            SHA1

                                                                            5bed8e92928e77d8273237a6ecc101c971de415d

                                                                            SHA256

                                                                            adc7109c762674906da495c5f918d90fab4cda765ec6bfc5c0959da138452c97

                                                                            SHA512

                                                                            d71e18e56a599af70b308502a70eab8d6d76d589602b642f2a61b1b8a2534a0fd604ea53b82fd35f68e8bc8f5dcc6a18fbd55f46d17d30ab70db933bf0ab1459

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qI5yO02.exe
                                                                            Filesize

                                                                            586KB

                                                                            MD5

                                                                            9ff69d782be45c75bdc58db2a6f6628c

                                                                            SHA1

                                                                            c37051f31ded347a4a7d7816d3e0be29edd106f5

                                                                            SHA256

                                                                            a2254994f944b53caea6bc4fdde2119219dd69abcb2e3ece19ccfb50656b2e78

                                                                            SHA512

                                                                            a3d2a228b34428b12ae6bb5ebdf5a5b55a3315adb8dbd1a8a2e062e7087b116d89c7e64e90ae00cca01c066601bad6755c38d458eb19eb26c50c71912996c450

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\3hC15ix.exe
                                                                            Filesize

                                                                            30KB

                                                                            MD5

                                                                            04e8f9ac5d5ca5686ec929e8c4aaa18a

                                                                            SHA1

                                                                            488492ee94c029314dc7a18474e586c621408c79

                                                                            SHA256

                                                                            a88fa27616123790bcb403946d8c433504c3d3c638342d163347ed7ea062f961

                                                                            SHA512

                                                                            2c3b6cdd9432b692196c22c2c33ae32a62d7f1af74801ad4baec5fc05f752947bd099ae50aef3805dff41f04acbca7f518e2b52541b8fe9f0e941b64e37230ed

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\qz1Kj77.exe
                                                                            Filesize

                                                                            461KB

                                                                            MD5

                                                                            6850e28a3bc35dd3df0228698f4627c2

                                                                            SHA1

                                                                            5efb32a0fcfee39273d560b4990d3d51a3787b0a

                                                                            SHA256

                                                                            d8af55ce42c3248a1bf90f81a5e0ae03a37a5e9a02c03657cba4f6370dcb72ca

                                                                            SHA512

                                                                            7f85989b6ea9cf3914870cbd9255542e4fa3b64dc882fae821f69169009830fb42c29f7bcbafa7a4a465922f9bd9a584c592e3aa9a389e056bfc6059afcd9847

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1EE79Gx9.exe
                                                                            Filesize

                                                                            886KB

                                                                            MD5

                                                                            8888c49aa48cf0ea1dc2be358624d147

                                                                            SHA1

                                                                            055f7dc5635544ad131cc1331a59e866c9402ff8

                                                                            SHA256

                                                                            1e111d314fae9689d28706c674c71ddaa6d7ecfc4df9d82560b4cc6dcb5a2348

                                                                            SHA512

                                                                            8cb0c17f17baef58112bf01e14242b24ac9e300a0fe6083554b8a4aed029ee7cc7afb174980fec2f782fc2fa1fed5f3d607dac963dc6f4c636c0cf52a8d8e8d2

                                                                          • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2NB1958.exe
                                                                            Filesize

                                                                            180KB

                                                                            MD5

                                                                            417acd301766be35eb9760efaa195bcd

                                                                            SHA1

                                                                            5e1f1cc3368eebc4a2d9e9dc3c72434e8342094f

                                                                            SHA256

                                                                            4504d172c4067a74a6c4baca4dcd5f217764296998fd67956587bc37e225c342

                                                                            SHA512

                                                                            3e9ca6b057f2c68ec9900d9abe41a391e28b84ddcfb80d20499a299eb98015dd02c2a43c614c01357b1233953ed0939cd7460b0e6daef5c0e514efbd2fd88f60

                                                                          • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                                                                            Filesize

                                                                            162B

                                                                            MD5

                                                                            1b7c22a214949975556626d7217e9a39

                                                                            SHA1

                                                                            d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                                            SHA256

                                                                            340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                                            SHA512

                                                                            ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                                          • \??\pipe\LOCAL\crashpad_4464_YFFYLFEUJGKXQFXE
                                                                            MD5

                                                                            d41d8cd98f00b204e9800998ecf8427e

                                                                            SHA1

                                                                            da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                            SHA256

                                                                            e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                            SHA512

                                                                            cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                          • memory/1576-59-0x00000000077E0000-0x0000000007872000-memory.dmp
                                                                            Filesize

                                                                            584KB

                                                                          • memory/1576-76-0x00000000079D0000-0x0000000007A0C000-memory.dmp
                                                                            Filesize

                                                                            240KB

                                                                          • memory/1576-74-0x00000000082A0000-0x00000000083AA000-memory.dmp
                                                                            Filesize

                                                                            1.0MB

                                                                          • memory/1576-51-0x0000000000400000-0x000000000043E000-memory.dmp
                                                                            Filesize

                                                                            248KB

                                                                          • memory/1576-78-0x0000000007A20000-0x0000000007A6C000-memory.dmp
                                                                            Filesize

                                                                            304KB

                                                                          • memory/1576-68-0x0000000004BE0000-0x0000000004BEA000-memory.dmp
                                                                            Filesize

                                                                            40KB

                                                                          • memory/1576-55-0x0000000074120000-0x00000000748D0000-memory.dmp
                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/1576-369-0x0000000074120000-0x00000000748D0000-memory.dmp
                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/1576-370-0x0000000007A10000-0x0000000007A20000-memory.dmp
                                                                            Filesize

                                                                            64KB

                                                                          • memory/1576-73-0x00000000088C0000-0x0000000008ED8000-memory.dmp
                                                                            Filesize

                                                                            6.1MB

                                                                          • memory/1576-75-0x0000000007970000-0x0000000007982000-memory.dmp
                                                                            Filesize

                                                                            72KB

                                                                          • memory/1576-58-0x0000000007CF0000-0x0000000008294000-memory.dmp
                                                                            Filesize

                                                                            5.6MB

                                                                          • memory/1576-64-0x0000000007A10000-0x0000000007A20000-memory.dmp
                                                                            Filesize

                                                                            64KB

                                                                          • memory/2952-43-0x0000000000400000-0x0000000000409000-memory.dmp
                                                                            Filesize

                                                                            36KB

                                                                          • memory/2952-45-0x0000000000400000-0x0000000000409000-memory.dmp
                                                                            Filesize

                                                                            36KB

                                                                          • memory/3352-44-0x0000000002590000-0x00000000025A6000-memory.dmp
                                                                            Filesize

                                                                            88KB

                                                                          • memory/4984-35-0x0000000000400000-0x000000000040A000-memory.dmp
                                                                            Filesize

                                                                            40KB

                                                                          • memory/4984-182-0x0000000074120000-0x00000000748D0000-memory.dmp
                                                                            Filesize

                                                                            7.7MB

                                                                          • memory/4984-42-0x0000000074120000-0x00000000748D0000-memory.dmp
                                                                            Filesize

                                                                            7.7MB