Analysis

  • max time kernel
    69s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 18:26

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    6a064f5aac429225163d47454073f334

  • SHA1

    35d03f5ccf0376adc6f804f4b77489811b974739

  • SHA256

    844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f

  • SHA512

    8198d39c76eddedbc4bc3ceff7a36df35c000156e4ee1bea99844668c5ef261955a7d640af760d57d9d51ff792f7da7f92698b09553fc29d2d8537fb189b4224

  • SSDEEP

    24576:EkA4GZU/RW7A17ebnjNdlgVQLF5MRZpzIyewaA26Ebp5Nfih9wAX7t9oe25AD0AI:tAJOAQ6z/GpzIXXc9/XQdA+Xx

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

redline

Botnet

LiveTraffic

C2

95.179.250.45:26212

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

65.21.18.51:45580

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

redline

Botnet

newbundle2

C2

185.215.113.67:15206

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

save

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Extracted

Family

lumma

C2

https://defenddsouneuw.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 14 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 39 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 26 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe
        "C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:2548
      • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe
        "C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Users\Admin\AppData\Roaming\5m8cSKca78.exe
          "C:\Users\Admin\AppData\Roaming\5m8cSKca78.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1776
        • C:\Users\Admin\AppData\Roaming\QSDgxX5MDd.exe
          "C:\Users\Admin\AppData\Roaming\QSDgxX5MDd.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2848
      • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe
        "C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
          "C:\Users\Admin\AppData\Local\Temp\054fdc5f70\Hkbsse.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1860
          • C:\Users\Admin\AppData\Local\Temp\1000068001\javumar2.exe
            "C:\Users\Admin\AppData\Local\Temp\1000068001\javumar2.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:2944
            • C:\Users\Admin\AppData\Local\Temp\is-4B5PH.tmp\javumar2.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-4B5PH.tmp\javumar2.tmp" /SL5="$701B4,12434628,845824,C:\Users\Admin\AppData\Local\Temp\1000068001\javumar2.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2804
      • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe
        "C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1336
      • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe
        "C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:668
        • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
          C:\Users\Admin\AppData\Local\Temp\svchost015.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:404
      • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe
        "C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2580
      • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe
        "C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:1544
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1700
      • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe
        "C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2536
      • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe
        "C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1112
      • C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe
        "C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2316
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 800
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:6928
      • C:\Users\Admin\AppData\Local\Temp\1000354001\c4842e5ead.exe
        "C:\Users\Admin\AppData\Local\Temp\1000354001\c4842e5ead.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:6592
      • C:\Users\Admin\AppData\Local\Temp\1000355001\4c39941fe4.exe
        "C:\Users\Admin\AppData\Local\Temp\1000355001\4c39941fe4.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:6844
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:264
          • C:\Users\Admin\AppData\Local\Temp\1000023001\b5d6468013.exe
            "C:\Users\Admin\AppData\Local\Temp\1000023001\b5d6468013.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3920
          • C:\Users\Admin\1000026002\181d0fa9cc.exe
            "C:\Users\Admin\1000026002\181d0fa9cc.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:4548
          • C:\Users\Admin\AppData\Local\Temp\1000028001\c1add8d4bd.exe
            "C:\Users\Admin\AppData\Local\Temp\1000028001\c1add8d4bd.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:5112
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
              6⤵
              • Enumerates system info in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:5144
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6829758,0x7fef6829768,0x7fef6829778
                7⤵
                  PID:5184
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1304,i,2254512274804370183,2265022148734536943,131072 /prefetch:2
                  7⤵
                    PID:5604
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1304,i,2254512274804370183,2265022148734536943,131072 /prefetch:8
                    7⤵
                      PID:5640
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1304,i,2254512274804370183,2265022148734536943,131072 /prefetch:8
                      7⤵
                        PID:5824
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2204 --field-trial-handle=1304,i,2254512274804370183,2265022148734536943,131072 /prefetch:1
                        7⤵
                          PID:2892
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2212 --field-trial-handle=1304,i,2254512274804370183,2265022148734536943,131072 /prefetch:1
                          7⤵
                            PID:1500
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1564 --field-trial-handle=1304,i,2254512274804370183,2265022148734536943,131072 /prefetch:2
                            7⤵
                              PID:4732
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2892 --field-trial-handle=1304,i,2254512274804370183,2265022148734536943,131072 /prefetch:1
                              7⤵
                                PID:2452
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
                              6⤵
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:4128
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6309758,0x7fef6309768,0x7fef6309778
                                7⤵
                                  PID:4148
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1396,i,9700160797899130912,8526501092636765688,131072 /prefetch:2
                                  7⤵
                                    PID:4420
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1568 --field-trial-handle=1396,i,9700160797899130912,8526501092636765688,131072 /prefetch:8
                                    7⤵
                                      PID:2172
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1660 --field-trial-handle=1396,i,9700160797899130912,8526501092636765688,131072 /prefetch:8
                                      7⤵
                                        PID:4476
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1396,i,9700160797899130912,8526501092636765688,131072 /prefetch:1
                                        7⤵
                                          PID:4788
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1396,i,9700160797899130912,8526501092636765688,131072 /prefetch:1
                                          7⤵
                                            PID:4800
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2608 --field-trial-handle=1396,i,9700160797899130912,8526501092636765688,131072 /prefetch:1
                                            7⤵
                                              PID:5396
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1500 --field-trial-handle=1396,i,9700160797899130912,8526501092636765688,131072 /prefetch:2
                                              7⤵
                                                PID:5636
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1416 --field-trial-handle=1396,i,9700160797899130912,8526501092636765688,131072 /prefetch:8
                                                7⤵
                                                  PID:6032
                                            • C:\Users\Admin\AppData\Local\Temp\1000029001\65c215f6d3.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000029001\65c215f6d3.exe"
                                              5⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3144
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:6416
                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                        1⤵
                                          PID:4992

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\47831694-dcb6-40f4-852a-29de39970399.tmp

                                          Filesize

                                          2B

                                          MD5

                                          99914b932bd37a50b983c5e7c90ae93b

                                          SHA1

                                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                          SHA256

                                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                          SHA512

                                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                          Filesize

                                          40B

                                          MD5

                                          44691fdf709576c5467bd86b9d95cecb

                                          SHA1

                                          9c0e49c662f20cdd89217f1bb4b4ba701e659697

                                          SHA256

                                          bbeef7deae86cbdb634c26982101647e319bb03dce941d124f0ab0edc8a76de9

                                          SHA512

                                          e52fb7f7091ed7a21944c629081fa5069f47fc076911101e20fdcc183c35b7b460fbbfac56f1f91052b1d35a35e66ce2dafce70349ed34ca6f16ba1e1f1fabdf

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                          Filesize

                                          16B

                                          MD5

                                          979c29c2917bed63ccf520ece1d18cda

                                          SHA1

                                          65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                          SHA256

                                          b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                          SHA512

                                          e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          f50f89a0a91564d0b8a211f8921aa7de

                                          SHA1

                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                          SHA256

                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                          SHA512

                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                          Filesize

                                          16B

                                          MD5

                                          18e723571b00fb1694a3bad6c78e4054

                                          SHA1

                                          afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                          SHA256

                                          8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                          SHA512

                                          43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e61e840e-7e92-4bda-bad5-6e46bd332a97.tmp

                                          Filesize

                                          6KB

                                          MD5

                                          6b29bce0a9499ab46de6ef2c73b95aff

                                          SHA1

                                          e7b97b15e55d34d142ba95f6c8fd5e892a531f7d

                                          SHA256

                                          1293d15adc9e4a3636f76532c3257ea8a6feef0d7a73911aebe759a1636806fa

                                          SHA512

                                          bca15491ef5de5178606479def5f301ed5f75652f0a08ca8b03d576378e2f99034bc1780db59a26ccfb886f45c3516246f8f7ff56092caef0b1642e6e0baf188

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000010.dbtmp

                                          Filesize

                                          16B

                                          MD5

                                          60e3f691077715586b918375dd23c6b0

                                          SHA1

                                          476d3eab15649c40c6aebfb6ac2366db50283d1b

                                          SHA256

                                          e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                          SHA512

                                          d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                        • C:\Users\Admin\AppData\Local\Temp\1000002001\gold.exe

                                          Filesize

                                          312KB

                                          MD5

                                          389881b424cf4d7ec66de13f01c7232a

                                          SHA1

                                          d3bc5a793c1b8910e1ecc762b69b3866e4c5ba78

                                          SHA256

                                          9d1211b3869ca43840b7da1677b257ad37521aab47719c6fcfe343121760b746

                                          SHA512

                                          2b9517d5d9d972e8754a08863a29e3d3e3cfde58e20d433c85546c2298aad50ac8b069cafd5abb3c86e24263d662c6e1ea23c0745a2668dfd215ddbdfbd1ab96

                                        • C:\Users\Admin\AppData\Local\Temp\1000004001\12dsvc.exe

                                          Filesize

                                          1006KB

                                          MD5

                                          c005d4ffa3e28c22b41a9d222598260a

                                          SHA1

                                          57cc3a6540bc38c649ddfdd54fa4f3c8a2423677

                                          SHA256

                                          799d10acbb0e2886c4d32c771964f4c2cb47f93c817cdc26a9acaefa3ba042cb

                                          SHA512

                                          ce39903c46160deeee1c7b362000361a3f5a9243b2e180bbaafa5b8ab09cc09ca413ce32f4deb2074fa928110d25b3dae7465c849fc388a58ddf649a9caa3a68

                                        • C:\Users\Admin\AppData\Local\Temp\1000005001\Nework.exe

                                          Filesize

                                          416KB

                                          MD5

                                          f5d7b79ee6b6da6b50e536030bcc3b59

                                          SHA1

                                          751b555a8eede96d55395290f60adc43b28ba5e2

                                          SHA256

                                          2f1aff28961ba0ce85ea0e35b8936bc387f84f459a4a1d63d964ce79e34b8459

                                          SHA512

                                          532b17cd2a6ac5172b1ddba1e63edd51ab53a4527204415241e3a78e8ffeb9728071bde5ae1eefabefd2627f00963f8a5458668cd7b8df041c8683252ff56b46

                                        • C:\Users\Admin\AppData\Local\Temp\1000028001\c1add8d4bd.exe

                                          Filesize

                                          1.1MB

                                          MD5

                                          f079b83f705baab21534eda26083d635

                                          SHA1

                                          90157d55c45f976dc52af3709c584edeac892410

                                          SHA256

                                          45b23cc25a7e9ee3a9b909ade3f3ae59833efb258622b27776b12c9f0b2f2cc9

                                          SHA512

                                          d2d533e0f135eae54371707871a46671c7a0fa08dcd22938334b9dc22c32254283b67a765c0bc0a2285a237735c60c7abbe4b2fe56630eefa443958f512281b8

                                        • C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default2.exe

                                          Filesize

                                          187KB

                                          MD5

                                          7a02aa17200aeac25a375f290a4b4c95

                                          SHA1

                                          7cc94ca64268a9a9451fb6b682be42374afc22fd

                                          SHA256

                                          836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                                          SHA512

                                          f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                                        • C:\Users\Admin\AppData\Local\Temp\1000068001\javumar2.exe

                                          Filesize

                                          12.8MB

                                          MD5

                                          534704bd30b2d7af9e4537980a8474b1

                                          SHA1

                                          e4c78f68d7cb4e7c7ded41bf952044a9b5a8d8f0

                                          SHA256

                                          ea8f9e43b89dd8c9ecd7d5413fe82ca75e5acd0d99ea00b9841117361676df0a

                                          SHA512

                                          44e51dacdeffc57f968724cc10111499b6cad4a824393241daa4337e6d614ff097bd0b905e04edda7de9a066cc6b7b4994dd077e3c84db522270e0431f6ce989

                                        • C:\Users\Admin\AppData\Local\Temp\1000191001\needmoney.exe

                                          Filesize

                                          4.1MB

                                          MD5

                                          7fa5c660d124162c405984d14042506f

                                          SHA1

                                          69f0dff06ff1911b97a2a0aa4ca9046b722c6b2f

                                          SHA256

                                          fd3edfaff77dd969e3e0d086495e4c742d00e111df9f935ed61dfba8392584b2

                                          SHA512

                                          d50848adbfe75f509414acc97096dad191ae4cef54752bdddcb227ffc0f59bfd2770561e7b3c2a14f4a1423215f05847206ad5c242c7fd5b0655edf513b22f6c

                                        • C:\Users\Admin\AppData\Local\Temp\1000254001\penis.exe

                                          Filesize

                                          409KB

                                          MD5

                                          a21700718c70ec5e787ad373cb72a757

                                          SHA1

                                          027554ab5ff3245e7617f3b83d6548bf7919f92e

                                          SHA256

                                          87e639ecc7704cb5e29f1ebb1d8ade3ae863aaa2505a37b28f2d45121da500c6

                                          SHA512

                                          ea292a5442d9fe536e650a2bc5142dd3aef79c66930243897e0e87c57915f0a54e45e03e58daffb473f85fe10b963d4670050bff5ab3f91121d21d463e25659b

                                        • C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe

                                          Filesize

                                          314KB

                                          MD5

                                          ff5afed0a8b802d74af1c1422c720446

                                          SHA1

                                          7135acfa641a873cb0c4c37afc49266bfeec91d8

                                          SHA256

                                          17ac37b4946539fa7fa68b12bd80946d340497a7971802b5848830ad99ea1e10

                                          SHA512

                                          11724d26e11b3146e0fc947c06c59c004c015de0afea24ec28a4eb8145fcd51e9b70007e17621c83f406d9aeb7cd96601245671d41c3fcc88a27c33bd7cf55ac

                                        • C:\Users\Admin\AppData\Local\Temp\1000314001\LummaC222222.exe

                                          Filesize

                                          352KB

                                          MD5

                                          2f1d09f64218fffe7243a8b44345b27e

                                          SHA1

                                          72553e1b3a759c17f54e7b568f39b3f8f1b1cdbe

                                          SHA256

                                          4a553c39728410eb0ebd5e530fc47ef1bdf4b11848a69889e8301974fc26cde2

                                          SHA512

                                          5871e2925ca8375f3c3ce368c05eb67796e1fbec80649d3cc9c39b57ee33f46476d38d3ea8335e2f5518c79f27411a568209f9f6ef38a56650c7436bbaa3f909

                                        • C:\Users\Admin\AppData\Local\Temp\1000322001\newbundle2.exe

                                          Filesize

                                          304KB

                                          MD5

                                          58e8b2eb19704c5a59350d4ff92e5ab6

                                          SHA1

                                          171fc96dda05e7d275ec42840746258217d9caf0

                                          SHA256

                                          07d4b7768e13d79ac5f05f81167b29bb6fbf97828a289d8d11eec38939846834

                                          SHA512

                                          e7655762c5f2d10ec246d11f82d437a2717ad05be847b5e0fd055e3241caaca85430f424055b343e3a44c90d76a0ba07a6913c2208f374f59b61f8aa4477889f

                                        • C:\Users\Admin\AppData\Local\Temp\1000342001\rstxdhuj.exe

                                          Filesize

                                          963KB

                                          MD5

                                          1ef39c8bc5799aa381fe093a1f2d532a

                                          SHA1

                                          57eabb02a7c43c9682988227dd470734cc75edb2

                                          SHA256

                                          0cced5b50789fca3ad4b2c151b798363d712da04c377bd704dcef4898e66b2b4

                                          SHA512

                                          13a9c267c4ceb2bd176f1339faa035ffeb08936deeeb4e38252ea43cfe487ea1c1876e4cc2a965548e767af02805a1da62885e6538da056be0c6fae33b637682

                                        • C:\Users\Admin\AppData\Local\Temp\1000354001\c4842e5ead.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          15e3eff7aa2298f99c7987c515a9e701

                                          SHA1

                                          5a26ac6f1a2fbfb15974ea1acc2e5a569f0d5c33

                                          SHA256

                                          f302fb495483ed24ae836bf696ce0337ba39464b0c80a99f7eb1c0dcfe96bc3f

                                          SHA512

                                          9f9d5f4755dea9e6674a10521c650e6d455af3aba262be02ee7dcd67f5ced6a1330a6a3e39a1b283f7ed98e6f73f532cac1d76e33b7641103a3b481db97fa03f

                                        • C:\Users\Admin\AppData\Local\Temp\1000355001\4c39941fe4.exe

                                          Filesize

                                          1.9MB

                                          MD5

                                          bdb0e8b56837a2baebf92323378e3467

                                          SHA1

                                          a6914eaad32a7f1cb8b6e46f504faa105e0688a1

                                          SHA256

                                          14a681694f4e1731a80ac8e3658242250989a1deceebfa460e64ffb0e210fccc

                                          SHA512

                                          cceb93307f59d4acc461d92ea2eaa7ac03870238fb28686049914db25d4e146ee28f499512e16c4bd24fe2aa6bf4edcc7e48e6301dacecc8267369dc4adfc9ae

                                        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                          Filesize

                                          1.8MB

                                          MD5

                                          6a064f5aac429225163d47454073f334

                                          SHA1

                                          35d03f5ccf0376adc6f804f4b77489811b974739

                                          SHA256

                                          844987087405a578c916395785e083a9b71b1d84754c289c3321d4146a166e9f

                                          SHA512

                                          8198d39c76eddedbc4bc3ceff7a36df35c000156e4ee1bea99844668c5ef261955a7d640af760d57d9d51ff792f7da7f92698b09553fc29d2d8537fb189b4224

                                        • C:\Users\Admin\AppData\Local\Temp\CabB08C.tmp

                                          Filesize

                                          70KB

                                          MD5

                                          49aebf8cbd62d92ac215b2923fb1b9f5

                                          SHA1

                                          1723be06719828dda65ad804298d0431f6aff976

                                          SHA256

                                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                          SHA512

                                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                        • C:\Users\Admin\AppData\Local\Temp\TarB254.tmp

                                          Filesize

                                          181KB

                                          MD5

                                          4ea6026cf93ec6338144661bf1202cd1

                                          SHA1

                                          a1dec9044f750ad887935a01430bf49322fbdcb7

                                          SHA256

                                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                          SHA512

                                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                        • C:\Users\Admin\AppData\Local\Temp\Tmp9D69.tmp

                                          Filesize

                                          2KB

                                          MD5

                                          1420d30f964eac2c85b2ccfe968eebce

                                          SHA1

                                          bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                          SHA256

                                          f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                          SHA512

                                          6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                        • C:\Users\Admin\AppData\Local\Temp\tmp325B.tmp

                                          Filesize

                                          20KB

                                          MD5

                                          c9ff7748d8fcef4cf84a5501e996a641

                                          SHA1

                                          02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

                                          SHA256

                                          4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

                                          SHA512

                                          d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

                                        • C:\Users\Admin\AppData\Local\Temp\tmp32BC.tmp

                                          Filesize

                                          46KB

                                          MD5

                                          02d2c46697e3714e49f46b680b9a6b83

                                          SHA1

                                          84f98b56d49f01e9b6b76a4e21accf64fd319140

                                          SHA256

                                          522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                          SHA512

                                          60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                        • C:\Users\Admin\AppData\Local\Temp\tmp32FC.tmp

                                          Filesize

                                          92KB

                                          MD5

                                          ae2cd96016ba8a9d0c675d9d9badbee7

                                          SHA1

                                          fd9df8750aacb0e75b2463c285c09f3bbd518a69

                                          SHA256

                                          dd0ea2f02d850df691183602f62284445e4871e26a61d9ea72ff1c23c0b0ba04

                                          SHA512

                                          7e0e86980b7f928ea847a097545fa07b0c554617768760d4db9afe448568b97d1536a824b7a1b6c1f3fb1bf14153be07ef32676f878fb63a167d47e3136b5d1d

                                        • C:\Users\Admin\AppData\Roaming\5m8cSKca78.exe

                                          Filesize

                                          490KB

                                          MD5

                                          b473c40205c61dc4750bc49f779908dd

                                          SHA1

                                          88a0fc0962099f0ac2d827d2c4d691ed9cade251

                                          SHA256

                                          8707c03158ba6395a11bdfd8c1b11eeedc2e052d3b55d73d0a5c64417e5fbd3b

                                          SHA512

                                          8fbaaa5bde30fe7c6e31a349c14e3bd710e92c4dbcca8cbdbaf34583887bc31e07e10a0223fc6c6c0d091787c296eba139ec91af44ec4ee6abbfb611493951d1

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1488793075-819845221-1497111674-1000\76b53b3ec448f7ccdda2063b15d2bfc3_18cc84e5-41c1-45e6-bdc9-06ff0c9e128a

                                          Filesize

                                          2KB

                                          MD5

                                          b41d0c975a948f4416000a804e1efdc7

                                          SHA1

                                          5c7392e481422d4c661e1ee885ae7d09094c34d9

                                          SHA256

                                          70eaa5e9c9d48ebe44556407c48eb3717a618ca56ff57b58d96d50bd18fd35e6

                                          SHA512

                                          a95fab87ae586ad78de27de7b067042107df9da3e41e7da842edea18fd01dd4d690a1abac53eb657853e39f04642da161f88a92bf4ef2ff95793feb6f9272ea6

                                        • C:\Users\Public\Desktop\Google Chrome.lnk

                                          Filesize

                                          2KB

                                          MD5

                                          d01c4fd6b704836d734f9ddac8fe2b1e

                                          SHA1

                                          132ddb4f1a58496b5b2667b8cb2a4d6c3f8e2eb4

                                          SHA256

                                          29cf60a2947ca372347bbc47ca600ae1be0718085412bbd9bcad4c625b2b51d6

                                          SHA512

                                          39993e51412d032550ac8d59d2d8235d70de4cbae3e32e23562271d5c207128580053a2ef765551b7bb80c2b7eae63d7d9889dfc996e95dea7c0e1734949aaed

                                        • \ProgramData\mozglue.dll

                                          Filesize

                                          593KB

                                          MD5

                                          c8fd9be83bc728cc04beffafc2907fe9

                                          SHA1

                                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                          SHA256

                                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                          SHA512

                                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                        • \ProgramData\nss3.dll

                                          Filesize

                                          2.0MB

                                          MD5

                                          1cc453cdf74f31e4d913ff9c10acdde2

                                          SHA1

                                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                          SHA256

                                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                          SHA512

                                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                        • \Users\Admin\AppData\Local\Temp\is-4B5PH.tmp\javumar2.tmp

                                          Filesize

                                          3.2MB

                                          MD5

                                          97dce6295efe4b54ef6cf3e7d344530d

                                          SHA1

                                          037df420c8dfb42cb7566f1435ba7d31c33ac0e9

                                          SHA256

                                          37a2fe2fe9edf836698d72ba673bdcc648c09d75e7000be7fca7dda8b61f2be4

                                          SHA512

                                          f4ab1e15f3334de9b499e475a2608bc0d864dccf2f40f7b92421b21cc9d368c2305ba0be8e06152bb42570d2adabdb96c76713cc9d1fe54b4d4c75843fdc6b20

                                        • \Users\Admin\AppData\Local\Temp\is-C57PD.tmp\_isetup\_isdecmp.dll

                                          Filesize

                                          28KB

                                          MD5

                                          077cb4461a2767383b317eb0c50f5f13

                                          SHA1

                                          584e64f1d162398b7f377ce55a6b5740379c4282

                                          SHA256

                                          8287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64

                                          SHA512

                                          b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547

                                        • \Users\Admin\AppData\Local\Temp\svchost015.exe

                                          Filesize

                                          2.9MB

                                          MD5

                                          b826dd92d78ea2526e465a34324ebeea

                                          SHA1

                                          bf8a0093acfd2eb93c102e1a5745fb080575372e

                                          SHA256

                                          7824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b

                                          SHA512

                                          1ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17

                                        • \Users\Admin\AppData\Roaming\QSDgxX5MDd.exe

                                          Filesize

                                          304KB

                                          MD5

                                          65c058e4a90d2ec70b03211d768b6ecc

                                          SHA1

                                          bf5af6f650759e5e612d42d72145660056737164

                                          SHA256

                                          5a00e3718afb5bfb18a6b1c824b680015733f0403af0d5663289a17ba8206cc3

                                          SHA512

                                          3d9114409f8096ce8a1d134a48235fbbad0c6c53f820707a951bac42c4f7ba6a38e98a50c9d929f049042263a7c0e24da8368d3aa4e934f5da79e9bda4a930aa

                                        • memory/264-1587-0x0000000006CF0000-0x00000000073A1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/264-1546-0x0000000000C70000-0x0000000001144000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/264-1649-0x0000000006CF0000-0x00000000073A1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/264-1667-0x0000000006CF0000-0x00000000073A1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/264-1706-0x0000000006CF0000-0x00000000073A1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/264-1589-0x0000000000C70000-0x0000000001144000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/264-1566-0x0000000006CF0000-0x00000000073A1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/264-1570-0x0000000006CF0000-0x00000000073A1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/404-232-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/404-227-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/404-225-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/404-223-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/404-221-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/404-233-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/404-219-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/404-1552-0x0000000000400000-0x0000000000643000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/668-231-0x0000000000400000-0x000000000081B000-memory.dmp

                                          Filesize

                                          4.1MB

                                        • memory/1112-341-0x0000000000830000-0x0000000000882000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/1336-158-0x0000000000CF0000-0x0000000000F33000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/1336-249-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                          Filesize

                                          972KB

                                        • memory/1336-1548-0x0000000000CF0000-0x0000000000F33000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/1544-248-0x0000000000DB0000-0x0000000000E04000-memory.dmp

                                          Filesize

                                          336KB

                                        • memory/1700-272-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/1700-270-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/1700-275-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/1700-276-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/1700-277-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/1700-268-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/1776-109-0x0000000001070000-0x00000000010F0000-memory.dmp

                                          Filesize

                                          512KB

                                        • memory/2124-15-0x00000000001B0000-0x000000000065B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2124-14-0x00000000001B0000-0x000000000065B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2124-5-0x00000000001B0000-0x000000000065B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2124-3-0x00000000001B0000-0x000000000065B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2124-2-0x00000000001B1000-0x00000000001DF000-memory.dmp

                                          Filesize

                                          184KB

                                        • memory/2124-1-0x00000000772A0000-0x00000000772A2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/2124-0-0x00000000001B0000-0x000000000065B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2316-1508-0x0000000004800000-0x0000000004854000-memory.dmp

                                          Filesize

                                          336KB

                                        • memory/2316-405-0x00000000049C0000-0x0000000004AA8000-memory.dmp

                                          Filesize

                                          928KB

                                        • memory/2316-401-0x00000000049C0000-0x0000000004AA8000-memory.dmp

                                          Filesize

                                          928KB

                                        • memory/2316-399-0x00000000049C0000-0x0000000004AA8000-memory.dmp

                                          Filesize

                                          928KB

                                        • memory/2316-397-0x00000000049C0000-0x0000000004AA8000-memory.dmp

                                          Filesize

                                          928KB

                                        • memory/2316-396-0x00000000049C0000-0x0000000004AA8000-memory.dmp

                                          Filesize

                                          928KB

                                        • memory/2316-395-0x00000000049C0000-0x0000000004AAE000-memory.dmp

                                          Filesize

                                          952KB

                                        • memory/2316-387-0x0000000000DB0000-0x0000000000EA8000-memory.dmp

                                          Filesize

                                          992KB

                                        • memory/2316-403-0x00000000049C0000-0x0000000004AA8000-memory.dmp

                                          Filesize

                                          928KB

                                        • memory/2316-1495-0x0000000000D40000-0x0000000000D8C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/2316-1494-0x0000000000CD0000-0x0000000000D38000-memory.dmp

                                          Filesize

                                          416KB

                                        • memory/2448-136-0x0000000000AA0000-0x0000000000F4B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2448-17-0x0000000000AA0000-0x0000000000F4B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2448-1852-0x0000000006440000-0x0000000006683000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2448-1517-0x0000000006900000-0x0000000006DD4000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/2448-1574-0x0000000006900000-0x0000000006DD4000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/2448-1491-0x0000000006900000-0x0000000006FB1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/2448-21-0x0000000000AA0000-0x0000000000F4B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2448-19-0x0000000000AA0000-0x0000000000F4B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2448-18-0x0000000000AA1000-0x0000000000ACF000-memory.dmp

                                          Filesize

                                          184KB

                                        • memory/2448-154-0x0000000000AA0000-0x0000000000F4B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2448-81-0x0000000000AA0000-0x0000000000F4B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2448-364-0x0000000000AA0000-0x0000000000F4B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2448-156-0x0000000006440000-0x0000000006683000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2448-1567-0x0000000006900000-0x0000000006FB1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/2448-1492-0x0000000006900000-0x0000000006FB1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/2448-1851-0x0000000006440000-0x0000000006683000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2448-157-0x0000000006440000-0x0000000006683000-memory.dmp

                                          Filesize

                                          2.3MB

                                        • memory/2448-155-0x0000000000AA0000-0x0000000000F4B000-memory.dmp

                                          Filesize

                                          4.7MB

                                        • memory/2548-41-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2548-39-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2548-50-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2548-51-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2548-48-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2548-43-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2548-47-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2548-45-0x0000000000400000-0x0000000000452000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2580-214-0x0000000000140000-0x00000000001AC000-memory.dmp

                                          Filesize

                                          432KB

                                        • memory/2680-36-0x0000000000830000-0x0000000000884000-memory.dmp

                                          Filesize

                                          336KB

                                        • memory/2848-96-0x0000000000380000-0x00000000003D2000-memory.dmp

                                          Filesize

                                          328KB

                                        • memory/2944-361-0x0000000001290000-0x000000000136C000-memory.dmp

                                          Filesize

                                          880KB

                                        • memory/3920-1571-0x0000000000F10000-0x00000000015C1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/3920-1650-0x0000000000F10000-0x00000000015C1000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/6592-1573-0x0000000000EA0000-0x0000000001551000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/6592-1569-0x0000000000EA0000-0x0000000001551000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/6592-1493-0x0000000000EA0000-0x0000000001551000-memory.dmp

                                          Filesize

                                          6.7MB

                                        • memory/6844-1545-0x0000000001200000-0x00000000016D4000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/6844-1544-0x0000000006D00000-0x00000000071D4000-memory.dmp

                                          Filesize

                                          4.8MB

                                        • memory/6844-1518-0x0000000001200000-0x00000000016D4000-memory.dmp

                                          Filesize

                                          4.8MB