Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2024 09:42

General

  • Target

    MailAcess Checker by xRisky.exe

  • Size

    10.4MB

  • MD5

    0bfe538046352ebb0d7b5fcd50a287ad

  • SHA1

    e76a0b5d42648df99604079af74931a333703ef3

  • SHA256

    a32ad92bc669d691f17c943761f30ebbdc17e85054595c648d78c1015ffcebb9

  • SHA512

    e938f69267ed773f26ec8b7d47d98b127c6f659ef04fde925484a1e755e20b435d61a2d3822274e23db48caaa1574c51ce3cb5c87c8c24109998bb0e0a58bfd2

  • SSDEEP

    196608:+6JnRoCYJnksvvcHbMdYWSm2iLRoyru5Q2ZGe/QDbA0SnTbja57K4q6:FPoVJnpqi+6XySReIqHjaQ4q

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Mutex

AsyncMutex_7SI8OkPnk

Attributes
  • delay

    3

  • install

    true

  • install_file

    ContainerRuntime.exe

  • install_folder

    %AppData%

  • pastebin_config

    https://pastebin.com/raw/Kb8rTgY7

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 64 IoCs
  • Checks BIOS information in registry 2 TTPs 64 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 64 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 64 IoCs
  • Themida packer 64 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 64 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
    "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ContainerRuntime" /tr '"C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"' & exit
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4468
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "ContainerRuntime" /tr '"C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2804
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9EA1.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1184
        • C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe
          "C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"
          4⤵
          • Executes dropped EXE
          PID:3584
    • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
      "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks computer location settings
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1000
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4240
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ContainerRuntime" /tr '"C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:860
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "ContainerRuntime" /tr '"C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"'
            5⤵
            • Scheduled Task/Job: Scheduled Task
            PID:3300
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB362.tmp.bat""
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5052
          • C:\Windows\SysWOW64\timeout.exe
            timeout 3
            5⤵
            • System Location Discovery: System Language Discovery
            • Delays execution with timeout.exe
            PID:4344
          • C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe
            "C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"
            5⤵
            • Executes dropped EXE
            PID:1136
      • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
        "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:712
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2820
        • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
          "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:2904
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1472
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ContainerRuntime" /tr '"C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"' & exit
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2936
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "ContainerRuntime" /tr '"C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"'
                7⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1872
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBE8D.tmp.bat""
              6⤵
                PID:1324
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 3
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Delays execution with timeout.exe
                  PID:3224
                • C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe
                  "C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"
                  7⤵
                  • Executes dropped EXE
                  PID:4380
            • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
              "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
              5⤵
              • Checks BIOS information in registry
              • Checks computer location settings
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4888
              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1744
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ContainerRuntime" /tr '"C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"' & exit
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:3576
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /f /sc onlogon /rl highest /tn "ContainerRuntime" /tr '"C:\Users\Admin\AppData\Roaming\ContainerRuntime.exe"'
                    8⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2000
              • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Checks computer location settings
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of WriteProcessMemory
                PID:1176
                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                  "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                  7⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1516
                • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                  "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                  7⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Checks computer location settings
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:400
                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:2124
                  • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                    "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                    8⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Checks whether UAC is enabled
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:4808
                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                      9⤵
                      • Executes dropped EXE
                      PID:1508
                    • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                      "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                      9⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Checks computer location settings
                      • Checks whether UAC is enabled
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      PID:2208
                      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                        10⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:3752
                      • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                        "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                        10⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Checks computer location settings
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:1800
                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                          11⤵
                          • Executes dropped EXE
                          PID:4012
                        • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                          "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                          11⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Checks whether UAC is enabled
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:3940
                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                            12⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:2212
                          • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                            "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                            12⤵
                            • Checks computer location settings
                            • Checks whether UAC is enabled
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:2888
                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                              13⤵
                              • Executes dropped EXE
                              PID:4316
                            • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                              "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                              13⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Checks computer location settings
                              • Checks whether UAC is enabled
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              PID:2896
                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                14⤵
                                • Executes dropped EXE
                                PID:4952
                              • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                14⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Checks whether UAC is enabled
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:2220
                                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                  "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                  15⤵
                                  • Executes dropped EXE
                                  PID:2964
                                • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                  "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                  15⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Checks computer location settings
                                  • Checks whether UAC is enabled
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:2624
                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                    16⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    PID:2560
                                  • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                    "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                    16⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks computer location settings
                                    • Checks whether UAC is enabled
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    PID:1124
                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                      17⤵
                                      • Executes dropped EXE
                                      PID:2108
                                    • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                      "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                      17⤵
                                      • Checks BIOS information in registry
                                      • Checks computer location settings
                                      • Checks whether UAC is enabled
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:1996
                                      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                        18⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:4552
                                      • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                        "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                        18⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks whether UAC is enabled
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:3736
                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                          19⤵
                                          • Executes dropped EXE
                                          PID:1656
                                        • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                          "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                          19⤵
                                          • Checks computer location settings
                                          • Checks whether UAC is enabled
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • System Location Discovery: System Language Discovery
                                          PID:2600
                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                            20⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:1876
                                          • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                            "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                            20⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Checks computer location settings
                                            • Checks whether UAC is enabled
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:4920
                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                              21⤵
                                              • Executes dropped EXE
                                              PID:2820
                                            • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                              "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                              21⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks computer location settings
                                              • Checks whether UAC is enabled
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              PID:2968
                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                22⤵
                                                • Executes dropped EXE
                                                PID:3460
                                              • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                22⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Checks computer location settings
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:5036
                                                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                  23⤵
                                                  • Executes dropped EXE
                                                  PID:4012
                                                • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                  23⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Checks computer location settings
                                                  • Checks whether UAC is enabled
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4116
                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                    24⤵
                                                    • Executes dropped EXE
                                                    PID:3604
                                                  • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                    24⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks computer location settings
                                                    • Checks whether UAC is enabled
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    PID:2892
                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                      25⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3740
                                                    • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                      25⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Checks computer location settings
                                                      • Checks whether UAC is enabled
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:5008
                                                      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                        26⤵
                                                        • Executes dropped EXE
                                                        PID:692
                                                      • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                        26⤵
                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                        • Checks BIOS information in registry
                                                        • Checks computer location settings
                                                        • Checks whether UAC is enabled
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        PID:232
                                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                          27⤵
                                                          • Executes dropped EXE
                                                          PID:2724
                                                        • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                          27⤵
                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                          • Checks BIOS information in registry
                                                          • Checks computer location settings
                                                          • Checks whether UAC is enabled
                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2344
                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                            28⤵
                                                            • Executes dropped EXE
                                                            PID:2588
                                                          • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                            28⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Checks computer location settings
                                                            • Checks whether UAC is enabled
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            PID:3576
                                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                              29⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4284
                                                            • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                              29⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Checks computer location settings
                                                              • Checks whether UAC is enabled
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              PID:3268
                                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                30⤵
                                                                • Executes dropped EXE
                                                                PID:4780
                                                              • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                30⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Checks computer location settings
                                                                • Checks whether UAC is enabled
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                PID:4968
                                                                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                  31⤵
                                                                  • Executes dropped EXE
                                                                  PID:4884
                                                                • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                  31⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks whether UAC is enabled
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  PID:536
                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                    32⤵
                                                                    • Executes dropped EXE
                                                                    PID:2952
                                                                  • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                    32⤵
                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                    • Checks computer location settings
                                                                    • Checks whether UAC is enabled
                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                    PID:552
                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                      33⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:860
                                                                    • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                      33⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Checks computer location settings
                                                                      • Checks whether UAC is enabled
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5060
                                                                      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                        34⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2228
                                                                      • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                        34⤵
                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                        • Checks BIOS information in registry
                                                                        • Checks computer location settings
                                                                        • Checks whether UAC is enabled
                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4756
                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                          35⤵
                                                                          • Executes dropped EXE
                                                                          PID:4028
                                                                        • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                          35⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Checks computer location settings
                                                                          • Checks whether UAC is enabled
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:1472
                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                            36⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:1148
                                                                          • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                            36⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks computer location settings
                                                                            • Checks whether UAC is enabled
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:4760
                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                              37⤵
                                                                              • Executes dropped EXE
                                                                              PID:4948
                                                                            • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                              37⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Checks computer location settings
                                                                              • Checks whether UAC is enabled
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              PID:4312
                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                38⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:3068
                                                                              • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                38⤵
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks computer location settings
                                                                                • Checks whether UAC is enabled
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                PID:2740
                                                                                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                  39⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:724
                                                                                • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                  39⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Checks whether UAC is enabled
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  PID:116
                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                    40⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:3012
                                                                                  • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                    40⤵
                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                    • Checks whether UAC is enabled
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2676
                                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                      41⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1324
                                                                                    • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                      41⤵
                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                      • Checks BIOS information in registry
                                                                                      • Checks computer location settings
                                                                                      • Checks whether UAC is enabled
                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                      PID:1792
                                                                                      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                        42⤵
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:5064
                                                                                      • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                        42⤵
                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                        • Checks BIOS information in registry
                                                                                        • Checks computer location settings
                                                                                        • Checks whether UAC is enabled
                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:3268
                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                          43⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:3164
                                                                                        • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                          43⤵
                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                          • Checks computer location settings
                                                                                          • Checks whether UAC is enabled
                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4552
                                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                            44⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:2600
                                                                                          • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                            44⤵
                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                            • Checks BIOS information in registry
                                                                                            • Checks computer location settings
                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                            PID:2120
                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                              45⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:2992
                                                                                            • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                              45⤵
                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                              • Checks computer location settings
                                                                                              • Checks whether UAC is enabled
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              PID:3448
                                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                46⤵
                                                                                                • Executes dropped EXE
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4004
                                                                                              • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                46⤵
                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                • Checks BIOS information in registry
                                                                                                • Checks computer location settings
                                                                                                • Checks whether UAC is enabled
                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                PID:1188
                                                                                                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                  47⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:3988
                                                                                                • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                  47⤵
                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                  • Checks BIOS information in registry
                                                                                                  • Checks computer location settings
                                                                                                  • Checks whether UAC is enabled
                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:4916
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                    48⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:4544
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                    48⤵
                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                    • Checks BIOS information in registry
                                                                                                    • Checks computer location settings
                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                    PID:4264
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                      49⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:2180
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                      49⤵
                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                      • Checks BIOS information in registry
                                                                                                      • Checks computer location settings
                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                      PID:2324
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                        50⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:876
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                        50⤵
                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                        • Checks BIOS information in registry
                                                                                                        • Checks computer location settings
                                                                                                        • Checks whether UAC is enabled
                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                        PID:664
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                          51⤵
                                                                                                          • Executes dropped EXE
                                                                                                          PID:232
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                          51⤵
                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                          • Checks computer location settings
                                                                                                          • Checks whether UAC is enabled
                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                          PID:1148
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                            52⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4260
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                            52⤵
                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                            • Checks BIOS information in registry
                                                                                                            • Checks computer location settings
                                                                                                            • Checks whether UAC is enabled
                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                            PID:4324
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                              53⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:1300
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                              53⤵
                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                              • Checks BIOS information in registry
                                                                                                              • Checks computer location settings
                                                                                                              • Checks whether UAC is enabled
                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:2164
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                54⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:3540
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                54⤵
                                                                                                                • Checks BIOS information in registry
                                                                                                                • Checks whether UAC is enabled
                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:2676
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                  55⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:2588
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                  55⤵
                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                  • Checks BIOS information in registry
                                                                                                                  • Checks computer location settings
                                                                                                                  • Checks whether UAC is enabled
                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                  PID:2108
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                    56⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:2508
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                    56⤵
                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                    • Checks BIOS information in registry
                                                                                                                    • Checks whether UAC is enabled
                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                    PID:2736
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                      57⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:1324
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                      57⤵
                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                      • Checks BIOS information in registry
                                                                                                                      • Checks computer location settings
                                                                                                                      • Checks whether UAC is enabled
                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:4592
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                        58⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:4552
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                        58⤵
                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                        • Checks BIOS information in registry
                                                                                                                        • Checks whether UAC is enabled
                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                        PID:5068
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                          59⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:3568
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                          59⤵
                                                                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                          • Checks BIOS information in registry
                                                                                                                          • Checks computer location settings
                                                                                                                          • Checks whether UAC is enabled
                                                                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                          PID:2820
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                            60⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            PID:2600
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                            60⤵
                                                                                                                            • Checks BIOS information in registry
                                                                                                                            • Checks computer location settings
                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                            PID:2320
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                              61⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:1656
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                              61⤵
                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                              • Checks BIOS information in registry
                                                                                                                              • Checks computer location settings
                                                                                                                              • Checks whether UAC is enabled
                                                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                              PID:4800
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                62⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                PID:1564
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                62⤵
                                                                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                • Checks BIOS information in registry
                                                                                                                                • Checks computer location settings
                                                                                                                                • Checks whether UAC is enabled
                                                                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                PID:2844
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                  63⤵
                                                                                                                                    PID:2220
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                    63⤵
                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                    • Checks computer location settings
                                                                                                                                    • Checks whether UAC is enabled
                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    PID:4768
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                      64⤵
                                                                                                                                        PID:3248
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                        64⤵
                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                        • Checks computer location settings
                                                                                                                                        • Checks whether UAC is enabled
                                                                                                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                        PID:3752
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                          65⤵
                                                                                                                                            PID:1176
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                            65⤵
                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                            • Checks computer location settings
                                                                                                                                            • Checks whether UAC is enabled
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:1316
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                              66⤵
                                                                                                                                                PID:532
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                                66⤵
                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                • Checks computer location settings
                                                                                                                                                • Checks whether UAC is enabled
                                                                                                                                                PID:1636
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                                  67⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:4988
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                                  67⤵
                                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                  • Checks computer location settings
                                                                                                                                                  • Checks whether UAC is enabled
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:1788
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                                    68⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:1900
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                                    68⤵
                                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                    • Checks whether UAC is enabled
                                                                                                                                                    PID:4652
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                                      69⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:2108
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                                      69⤵
                                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                      • Checks computer location settings
                                                                                                                                                      • Checks whether UAC is enabled
                                                                                                                                                      PID:856
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                                        70⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:1792
                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                                        70⤵
                                                                                                                                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:4780
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                                          71⤵
                                                                                                                                                            PID:3484
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                                            71⤵
                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                            • Checks computer location settings
                                                                                                                                                            • Checks whether UAC is enabled
                                                                                                                                                            PID:4460
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                                              72⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:4268
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                                              72⤵
                                                                                                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                              • Checks computer location settings
                                                                                                                                                              • Checks whether UAC is enabled
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:1748
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                                                                                73⤵
                                                                                                                                                                  PID:1188
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\MailAcess Checker by xRisky.exe"
                                                                                                                                                                  73⤵
                                                                                                                                                                    PID:3584
                  • C:\Windows\System32\rundll32.exe
                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                    1⤵
                      PID:2120

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MailAcess Checker by xRisky.exe.log

                      Filesize

                      522B

                      MD5

                      0f39d6b9afc039d81ff31f65cbf76826

                      SHA1

                      8356d04fe7bba2695d59b6caf5c59f58f3e1a6d8

                      SHA256

                      ea16b63ffd431ebf658b903710b6b3a9b8a2eb6814eee3a53b707a342780315d

                      SHA512

                      5bad54adb2e32717ef6275f49e2f101dd7e2011c9be14a32e5c29051e8a3f608cbd0b44ac4855ab21e790cb7a5d84c5f69de087074fd01b35259d34d07f5aaf9

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log

                      Filesize

                      522B

                      MD5

                      acc9090417037dfa2a55b46ed86e32b8

                      SHA1

                      53fa6fb25fb3e88c24d2027aca6ae492b2800a4d

                      SHA256

                      2412679218bb0a7d05ceee32869bbb223619bde9966c4c460a68304a3367724b

                      SHA512

                      d51f7085ec147c708f446b9fb6923cd2fb64596d354ed929e125b30ace57c8cb3217589447a36960e5d3aea87a4e48aaa82c7509eced6d6c2cecd71fcfe3697b

                    • C:\Users\Admin\AppData\Local\Temp\Leaf.xNet.dll

                      Filesize

                      130KB

                      MD5

                      dc5f27d5f080e77f1b205e80199d5c1f

                      SHA1

                      0de5aa944ad8e1e5f1f064235ebb16f87c806d78

                      SHA256

                      60a1f61c367696219175b73eccdc868c44090b227b47754454c9fc47a5848f62

                      SHA512

                      c650d22eca52a4e05a0d5791f08c7b636986b8685a74b3264eb3efa400e0a0f687b013c57a1b890fc8ce98644e5a66f5b4e924d79b4ac60087a5c220ab3467df

                    • C:\Users\Admin\AppData\Local\Temp\MailKit.dll

                      Filesize

                      787KB

                      MD5

                      ba0255f547fab7eed60863ad27d24c97

                      SHA1

                      a5d095ac3d746eb400a314317a88c215d78cc304

                      SHA256

                      5fd7f167bdf289ae48b9f0f68e63c07370427d4eb8436005a5859b5bba3a7d2b

                      SHA512

                      e672daa19be91d84e5f2e0124b0508faeb241c91c6515f687a55b20d8febb2e2360e695aaf2e1d252e9ed0d494f71087315199f7b43eb6fa13949484ee177ea0

                    • C:\Users\Admin\AppData\Local\Temp\MetroSuite 2.0.dll

                      Filesize

                      305KB

                      MD5

                      0d30a398cec0ff006b6ea2b52d11e744

                      SHA1

                      4ceebd9c6180a321c4d4f3cfb5cfc3952bf72b45

                      SHA256

                      8604bf2a1fe2e94dc1ea1fbd0cf54e77303493b93994df48479dc683580aa654

                      SHA512

                      8e06ff131a81e73b1ff5de78262701a11ecc2bcdaf41011f4e96f11c5372742478e70b6a0901b61953c21c95725532af8d785654405ec5066ad157e2143467cc

                    • C:\Users\Admin\AppData\Local\Temp\MimeKit.dll

                      Filesize

                      971KB

                      MD5

                      695ef3be6c2169067e0f1d9f7d99bc27

                      SHA1

                      24185ff27f8a64fb71abf29b8f1338492cd7c0c6

                      SHA256

                      78d4f282269afba07ba89d1434dc1c3f9c48097fc252e93cf94e493ac8c109fd

                      SHA512

                      b3c7d1cee7f6ae16d66caf1d39113c0b5fe1b7ac4fb813134450679c82a2d306293799efc66c4d2ffed703dbc3921136f3cb393c2c4452791c8681129c74ed36

                    • C:\Users\Admin\AppData\Local\Temp\Qoollo.Turbo.dll

                      Filesize

                      349KB

                      MD5

                      4e8246df4ee956ec273c4baa2054593c

                      SHA1

                      7847f523fefc14fec2c739c293593b673fb1c9d8

                      SHA256

                      1172732fd0fe6b679f5c6bf750598133dc815622c55ef1fa84087087bf42b495

                      SHA512

                      13398ea46879d533774e7ace1d3320ca60f7220277fcb2393c243ffeadbb5bb37900f87ac35b9eeb134e26e71068874b9eee226853a52d1528d5db761bcf22b7

                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

                      Filesize

                      61KB

                      MD5

                      89ae031a0e2f7f28576a63d3c100dcaf

                      SHA1

                      6b26dfe7e76fbc96109a4d0773593443277978df

                      SHA256

                      acaa87f43a617016d09caeb26c1e30d9e9fd069fcbe2165723f80a0056aaf6bf

                      SHA512

                      aea507c78832cca5bf4b7c16ac5ba9b4b87028d2a99fbd1ca535a6336952516ab74571475f2a074b89b9c12754a2979803a3aba74c7a326f2c70a8431a7010d6

                    • C:\Users\Admin\AppData\Local\Temp\tmp9EA1.tmp.bat

                      Filesize

                      160B

                      MD5

                      e77ad31bc5f374509a58d6fa2f615f8c

                      SHA1

                      48803c2ac246abe2fb1e4d681a35a4c9a73e970b

                      SHA256

                      ccf73d269a1fdce91e714b228727c62d83d8e80cdebe5c6d9ae5dcf9a09a0a02

                      SHA512

                      4db4140a61b2e117d789c9c9897739c5e2cec1fa45b6d7b30638c11d742f1aea9224b3b53c27b478e3a6dd62568be0968a279fd19fb3795bd596c4b246d9fa89

                    • C:\Users\Admin\AppData\Local\Temp\tmpB362.tmp.bat

                      Filesize

                      160B

                      MD5

                      0174216b85436153177a576fca992207

                      SHA1

                      e4bfaaea0172c79c488f67e297c872c5dc82aaf6

                      SHA256

                      c991f97535cc3f9da3cf02962e16a90d76fa858bce6224d039ef8239adfe60ff

                      SHA512

                      20058ab55cc4659b6accb0a8d9efb544602b02d93089a773721cd00a147903faabb1261d74538528e5e289dcc9b0ebfaa5902d06f3acb0fdda106f61965677bb

                    • C:\Users\Admin\AppData\Local\Temp\tmpBE8D.tmp.bat

                      Filesize

                      160B

                      MD5

                      f66f598191e5bea61e432d61ebc2dbc9

                      SHA1

                      241ba3e64df7799de336ee18f5be59ce286f5a74

                      SHA256

                      8d3f34501ccad67e1d7e8bb8e1b96af02dd5e1f67f1f70e643a20764579320c6

                      SHA512

                      8b1c12671ae19e8b385ba2f27cc536b40c65895f3b5fa40fce1575e7b3e846a0421b0e220d4f96cd83096b5ca7b558b2b9bbb1625106d2a292da948e90fe573d

                    • memory/232-395-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/232-396-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/400-154-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/400-153-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/536-450-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/536-451-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/552-461-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/552-462-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/712-64-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/712-63-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/712-56-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/712-78-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1000-34-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1000-44-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1000-43-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1000-58-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/1000-59-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1000-35-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/1124-285-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1124-286-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1176-128-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1176-129-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1176-146-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1176-122-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1744-181-0x00000000064A0000-0x0000000006532000-memory.dmp

                      Filesize

                      584KB

                    • memory/1744-180-0x0000000006960000-0x0000000006F04000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/1744-186-0x0000000006490000-0x000000000649A000-memory.dmp

                      Filesize

                      40KB

                    • memory/1748-908-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1800-216-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1800-217-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1996-297-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/1996-296-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2208-199-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2208-197-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2220-264-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2220-263-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2344-406-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2344-407-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2600-319-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2600-318-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2624-274-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2624-275-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2888-242-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2888-241-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2892-373-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2892-374-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2896-253-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2896-252-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2904-76-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2904-102-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2904-83-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2904-82-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2968-341-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/2968-340-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/3268-429-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/3268-428-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/3576-417-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/3576-418-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/3736-308-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/3736-307-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/3940-231-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/3940-230-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4116-363-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4116-362-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4460-897-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4664-8-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/4664-4-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/4664-1-0x0000000075780000-0x0000000075781000-memory.dmp

                      Filesize

                      4KB

                    • memory/4664-2-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/4664-7-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/4664-0-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4664-6-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/4664-38-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/4664-37-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4664-3-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/4664-12-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4664-13-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4664-14-0x0000000005EB0000-0x0000000005F4C000-memory.dmp

                      Filesize

                      624KB

                    • memory/4664-5-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/4768-26-0x00000000005E0000-0x00000000005F6000-memory.dmp

                      Filesize

                      88KB

                    • memory/4768-27-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/4768-99-0x0000000075760000-0x0000000075850000-memory.dmp

                      Filesize

                      960KB

                    • memory/4808-177-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4808-178-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4888-101-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4888-106-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4888-124-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4888-107-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4916-633-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4920-330-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4920-329-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4968-439-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/4968-440-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/5008-385-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/5008-384-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/5036-351-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/5036-352-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/5060-472-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB

                    • memory/5060-473-0x0000000000430000-0x00000000013E8000-memory.dmp

                      Filesize

                      15.7MB