Analysis

  • max time kernel
    120s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 19:46

General

Malware Config

Extracted

Family

eternity

C2

http://izrukvro5khcol3z7cvvdq3akeunlod2gshgn7ppo3a4jvse3z5hpiyd.onion

Extracted

Family

xworm

C2

0.tcp.jp.ngrok.io:8848

Attributes
  • Install_directory

    %AppData%

  • install_file

    PictureManager.exe

Signatures

  • Detect Umbral payload 3 IoCs
  • Detect Xworm Payload 3 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 9 IoCs
  • Runs ping.exe 1 TTPs 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://oxy.st/d/qiQh
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9835546f8,0x7ff983554708,0x7ff983554718
      2⤵
        PID:828
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:2
        2⤵
          PID:3704
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4880
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:8
          2⤵
            PID:2360
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
            2⤵
              PID:1540
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
              2⤵
                PID:2464
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:1
                2⤵
                  PID:2536
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:1
                  2⤵
                    PID:3060
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:1
                    2⤵
                      PID:4000
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                      2⤵
                        PID:5044
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:1
                        2⤵
                          PID:4800
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6392 /prefetch:1
                          2⤵
                            PID:4892
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6620 /prefetch:1
                            2⤵
                              PID:620
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:1
                              2⤵
                                PID:4296
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6952 /prefetch:1
                                2⤵
                                  PID:3872
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7040 /prefetch:1
                                  2⤵
                                    PID:1512
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7228 /prefetch:1
                                    2⤵
                                      PID:4860
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7008 /prefetch:1
                                      2⤵
                                        PID:3780
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7556 /prefetch:1
                                        2⤵
                                          PID:760
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7760 /prefetch:1
                                          2⤵
                                            PID:4796
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7928 /prefetch:1
                                            2⤵
                                              PID:1940
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7984 /prefetch:1
                                              2⤵
                                                PID:3612
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6392 /prefetch:1
                                                2⤵
                                                  PID:5372
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6716 /prefetch:1
                                                  2⤵
                                                    PID:5460
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:1
                                                    2⤵
                                                      PID:5744
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:8
                                                      2⤵
                                                        PID:6080
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:8
                                                        2⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:2992
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:1
                                                        2⤵
                                                          PID:1832
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                                                          2⤵
                                                            PID:1800
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:1
                                                            2⤵
                                                              PID:4276
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7476 /prefetch:1
                                                              2⤵
                                                                PID:5236
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1
                                                                2⤵
                                                                  PID:5240
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:1
                                                                  2⤵
                                                                    PID:4472
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8020 /prefetch:1
                                                                    2⤵
                                                                      PID:5252
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7332 /prefetch:1
                                                                      2⤵
                                                                        PID:1912
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7864 /prefetch:1
                                                                        2⤵
                                                                          PID:3996
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:1
                                                                          2⤵
                                                                            PID:672
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:1
                                                                            2⤵
                                                                              PID:4532
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1
                                                                              2⤵
                                                                                PID:4600
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5448 /prefetch:8
                                                                                2⤵
                                                                                  PID:1904
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:1
                                                                                  2⤵
                                                                                    PID:3388
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,18340979666752757711,9233899775183182441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:8
                                                                                    2⤵
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:4376
                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                  1⤵
                                                                                    PID:2924
                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                    1⤵
                                                                                      PID:1836
                                                                                    • C:\Windows\System32\rundll32.exe
                                                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                      1⤵
                                                                                        PID:3944
                                                                                      • C:\Program Files\7-Zip\7zG.exe
                                                                                        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Setup\" -spe -an -ai#7zMap19184:72:7zEvent9312
                                                                                        1⤵
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                        PID:1596
                                                                                      • C:\Users\Admin\Downloads\Setup\Setup.exe
                                                                                        "C:\Users\Admin\Downloads\Setup\Setup.exe"
                                                                                        1⤵
                                                                                        • Checks computer location settings
                                                                                        • Executes dropped EXE
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Modifies registry class
                                                                                        PID:5996
                                                                                        • C:\Users\Admin\AppData\Local\Temp\DRG module.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\DRG module.exe"
                                                                                          2⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:4044
                                                                                          • C:\Windows\System32\Wbem\wmic.exe
                                                                                            "wmic.exe" csproduct get uuid
                                                                                            3⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:3552
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Microsoft picture manager.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\Microsoft picture manager.exe"
                                                                                          2⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:5392
                                                                                        • C:\Users\Admin\AppData\Local\Temp\GUI sub.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\GUI sub.exe"
                                                                                          2⤵
                                                                                          • Checks computer location settings
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Modifies registry class
                                                                                          PID:6088
                                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                                            "C:\Windows\System32\WScript.exe" "C:\portContainerServer\bpmdutc0M3cJEN2bLwLmjIrQzt9Evn2rH8angtBVEaFmTOq1CfF52scTNAX.vbe"
                                                                                            3⤵
                                                                                            • Checks computer location settings
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4380
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c ""C:\portContainerServer\PvszTCanD9rbZND.bat" "
                                                                                              4⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:4600
                                                                                              • C:\portContainerServer\AgentsavesRuntime.exe
                                                                                                "C:\portContainerServer/AgentsavesRuntime.exe"
                                                                                                5⤵
                                                                                                • Modifies WinLogon for persistence
                                                                                                • Checks computer location settings
                                                                                                • Executes dropped EXE
                                                                                                • Adds Run key to start application
                                                                                                • Drops file in Windows directory
                                                                                                • Modifies registry class
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:4976
                                                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mflka1n1\mflka1n1.cmdline"
                                                                                                  6⤵
                                                                                                  • Drops file in System32 directory
                                                                                                  PID:760
                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA582.tmp" "c:\Windows\System32\CSC5EFD8DE45F664EE9BD46DCC864F1DFA3.TMP"
                                                                                                    7⤵
                                                                                                      PID:3532
                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VsdVNTW6f8.bat"
                                                                                                    6⤵
                                                                                                      PID:3188
                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                        chcp 65001
                                                                                                        7⤵
                                                                                                          PID:2540
                                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                          7⤵
                                                                                                            PID:4888
                                                                                                          • C:\Users\Default\Start Menu\StartMenuExperienceHost.exe
                                                                                                            "C:\Users\Default\Start Menu\StartMenuExperienceHost.exe"
                                                                                                            7⤵
                                                                                                            • Checks computer location settings
                                                                                                            • Executes dropped EXE
                                                                                                            • Modifies registry class
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:464
                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jpLz1yvSlu.bat"
                                                                                                              8⤵
                                                                                                                PID:5908
                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                  chcp 65001
                                                                                                                  9⤵
                                                                                                                    PID:5972
                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                    ping -n 10 localhost
                                                                                                                    9⤵
                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                    • Runs ping.exe
                                                                                                                    PID:5256
                                                                                                                  • C:\Users\Default\Start Menu\StartMenuExperienceHost.exe
                                                                                                                    "C:\Users\Default\Start Menu\StartMenuExperienceHost.exe"
                                                                                                                    9⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Modifies registry class
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:5272
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ibWrXDwbZz.bat"
                                                                                                                      10⤵
                                                                                                                        PID:3264
                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                          chcp 65001
                                                                                                                          11⤵
                                                                                                                            PID:5804
                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                            ping -n 10 localhost
                                                                                                                            11⤵
                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                            • Runs ping.exe
                                                                                                                            PID:5820
                                                                                                                          • C:\Users\Default\Start Menu\StartMenuExperienceHost.exe
                                                                                                                            "C:\Users\Default\Start Menu\StartMenuExperienceHost.exe"
                                                                                                                            11⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:392
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\WIN helper.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\WIN helper.exe"
                                                                                                          2⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Accesses Microsoft Outlook profiles
                                                                                                          • Checks processor information in registry
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          • outlook_office_path
                                                                                                          • outlook_win_path
                                                                                                          PID:5084
                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                            "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                                                                                            3⤵
                                                                                                            • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                            PID:5356
                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                              chcp 65001
                                                                                                              4⤵
                                                                                                                PID:3460
                                                                                                              • C:\Windows\system32\netsh.exe
                                                                                                                netsh wlan show profile
                                                                                                                4⤵
                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                PID:2644
                                                                                                              • C:\Windows\system32\findstr.exe
                                                                                                                findstr All
                                                                                                                4⤵
                                                                                                                  PID:2316
                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                "cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key
                                                                                                                3⤵
                                                                                                                • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                PID:5352
                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                  chcp 65001
                                                                                                                  4⤵
                                                                                                                    PID:744
                                                                                                                  • C:\Windows\system32\netsh.exe
                                                                                                                    netsh wlan show profile name="65001" key=clear
                                                                                                                    4⤵
                                                                                                                    • Event Triggered Execution: Netsh Helper DLL
                                                                                                                    • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                    PID:5072
                                                                                                                  • C:\Windows\system32\findstr.exe
                                                                                                                    findstr Key
                                                                                                                    4⤵
                                                                                                                      PID:2708
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:4564
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:2112
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\TextInputHost.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:1596
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:744
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:2676
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\Idle.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:5100
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Templates\unsecapp.exe'" /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:2148
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Users\All Users\Templates\unsecapp.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:4748
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Templates\unsecapp.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:840
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 13 /tr "'C:\Windows\fr-FR\sysmon.exe'" /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:468
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "sysmon" /sc ONLOGON /tr "'C:\Windows\fr-FR\sysmon.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:1916
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "sysmons" /sc MINUTE /mo 6 /tr "'C:\Windows\fr-FR\sysmon.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:3168
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Start Menu\StartMenuExperienceHost.exe'" /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:1932
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Default\Start Menu\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:5624
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Start Menu\StartMenuExperienceHost.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:5740
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "AgentsavesRuntimeA" /sc MINUTE /mo 6 /tr "'C:\portContainerServer\AgentsavesRuntime.exe'" /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:5448
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "AgentsavesRuntime" /sc ONLOGON /tr "'C:\portContainerServer\AgentsavesRuntime.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:3840
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks.exe /create /tn "AgentsavesRuntimeA" /sc MINUTE /mo 13 /tr "'C:\portContainerServer\AgentsavesRuntime.exe'" /rl HIGHEST /f
                                                                                                                1⤵
                                                                                                                • Process spawned unexpected child process
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:4464
                                                                                                              • C:\Windows\System32\WScript.exe
                                                                                                                "C:\Windows\System32\WScript.exe" "C:\portContainerServer\bpmdutc0M3cJEN2bLwLmjIrQzt9Evn2rH8angtBVEaFmTOq1CfF52scTNAX.vbe"
                                                                                                                1⤵
                                                                                                                • Checks computer location settings
                                                                                                                PID:5244
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\portContainerServer\PvszTCanD9rbZND.bat" "
                                                                                                                  2⤵
                                                                                                                    PID:6012
                                                                                                                    • C:\portContainerServer\AgentsavesRuntime.exe
                                                                                                                      "C:\portContainerServer/AgentsavesRuntime.exe"
                                                                                                                      3⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:2372
                                                                                                                • C:\portContainerServer\AgentsavesRuntime.exe
                                                                                                                  "C:\portContainerServer\AgentsavesRuntime.exe"
                                                                                                                  1⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:3928
                                                                                                                  • C:\Windows\System32\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\N21q8QyzlD.bat"
                                                                                                                    2⤵
                                                                                                                      PID:5104
                                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                                        chcp 65001
                                                                                                                        3⤵
                                                                                                                          PID:2552
                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                          ping -n 10 localhost
                                                                                                                          3⤵
                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                          • Runs ping.exe
                                                                                                                          PID:2948
                                                                                                                        • C:\portContainerServer\AgentsavesRuntime.exe
                                                                                                                          "C:\portContainerServer\AgentsavesRuntime.exe"
                                                                                                                          3⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:4696
                                                                                                                    • C:\portContainerServer\AgentsavesRuntime.exe
                                                                                                                      "C:\portContainerServer\AgentsavesRuntime.exe" C:\portContainerServer\bpmdutc0M3cJEN2bLwLmjIrQzt9Evn2rH8angtBVEaFmTOq1CfF52scTNAX.vbe
                                                                                                                      1⤵
                                                                                                                      • Checks computer location settings
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Modifies registry class
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:3136
                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ghJDzcD21F.bat"
                                                                                                                        2⤵
                                                                                                                          PID:672
                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                            chcp 65001
                                                                                                                            3⤵
                                                                                                                              PID:6052
                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                              ping -n 10 localhost
                                                                                                                              3⤵
                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                              • Runs ping.exe
                                                                                                                              PID:2992
                                                                                                                            • C:\portContainerServer\AgentsavesRuntime.exe
                                                                                                                              "C:\portContainerServer\AgentsavesRuntime.exe"
                                                                                                                              3⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:2732
                                                                                                                        • C:\portContainerServer\AgentsavesRuntime.exe
                                                                                                                          "C:\portContainerServer\AgentsavesRuntime.exe"
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:5456
                                                                                                                        • C:\Windows\system32\taskmgr.exe
                                                                                                                          "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                          1⤵
                                                                                                                          • Checks SCSI registry key(s)
                                                                                                                          • Modifies registry class
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                          PID:3812

                                                                                                                        Network

                                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                                        Replay Monitor

                                                                                                                        Loading Replay Monitor...

                                                                                                                        Downloads

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                          Filesize

                                                                                                                          152B

                                                                                                                          MD5

                                                                                                                          ecf7ca53c80b5245e35839009d12f866

                                                                                                                          SHA1

                                                                                                                          a7af77cf31d410708ebd35a232a80bddfb0615bb

                                                                                                                          SHA256

                                                                                                                          882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687

                                                                                                                          SHA512

                                                                                                                          706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                          Filesize

                                                                                                                          152B

                                                                                                                          MD5

                                                                                                                          4dd2754d1bea40445984d65abee82b21

                                                                                                                          SHA1

                                                                                                                          4b6a5658bae9a784a370a115fbb4a12e92bd3390

                                                                                                                          SHA256

                                                                                                                          183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d

                                                                                                                          SHA512

                                                                                                                          92d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          1797fec6b291b7e85fb2333cc819050a

                                                                                                                          SHA1

                                                                                                                          2e4ad0dae4207cd122f42ab85e0056d75f4257b3

                                                                                                                          SHA256

                                                                                                                          19d5321aa0840dc8524c00f58cd41d9660c0a4ecf7e2cb5c40f9a74c70ce34cc

                                                                                                                          SHA512

                                                                                                                          da78b8d19a67814543fe4484377c69377237d90a93b34c148a46964289d42e47ccfe060fc0b355e623be260e9d92c04e01e25931e2f7c91eebbfa0fdd62648c7

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cookies

                                                                                                                          Filesize

                                                                                                                          28KB

                                                                                                                          MD5

                                                                                                                          b85730a3dd780124660d692a47bd376c

                                                                                                                          SHA1

                                                                                                                          a68b6b03705b24eeecb376eb5cfe016e95fb994f

                                                                                                                          SHA256

                                                                                                                          966c0a1e7c80c8b3ce8a3ff4e1980bff3a5394662b1a11496a960759aadba291

                                                                                                                          SHA512

                                                                                                                          8c12761e2e3dbe8e46f3acb1bc9267d4158741a9749f3fe9140bd6484aca40b7c13e040e9e3edb9f8ad05df9f022e99db9afdb60b6d08b1e74af486120387672

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_download.oxy.st_0.indexeddb.leveldb\CURRENT

                                                                                                                          Filesize

                                                                                                                          16B

                                                                                                                          MD5

                                                                                                                          46295cac801e5d4857d09837238a6394

                                                                                                                          SHA1

                                                                                                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                          SHA256

                                                                                                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                          SHA512

                                                                                                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_download.oxy.st_0.indexeddb.leveldb\MANIFEST-000001

                                                                                                                          Filesize

                                                                                                                          23B

                                                                                                                          MD5

                                                                                                                          3fd11ff447c1ee23538dc4d9724427a3

                                                                                                                          SHA1

                                                                                                                          1335e6f71cc4e3cf7025233523b4760f8893e9c9

                                                                                                                          SHA256

                                                                                                                          720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed

                                                                                                                          SHA512

                                                                                                                          10a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                          Filesize

                                                                                                                          5KB

                                                                                                                          MD5

                                                                                                                          3b342622f24b7cabf7a0ecdb028c5ccc

                                                                                                                          SHA1

                                                                                                                          c9dd453d2d8d77af3034f415ded471daa7df6a1e

                                                                                                                          SHA256

                                                                                                                          433a27deafcca14d559bd96305f43b0136a04b0620e4716bc7ec9e47034c195b

                                                                                                                          SHA512

                                                                                                                          2dfd247f3de6799e2f19d45826ecd65b92ecb5a584544e84f41d1d4decc12fdcb853ff3e0fe69f7aba7000c3eabfd88498ed31345891a18a287ba7a9bac2e339

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                          Filesize

                                                                                                                          10KB

                                                                                                                          MD5

                                                                                                                          cb0c67e770bc7f45d45ed44b653cbd50

                                                                                                                          SHA1

                                                                                                                          e39d67d7eee6a3e0fc24ca27d7346f8d587ecb39

                                                                                                                          SHA256

                                                                                                                          55ff7db466a96f1b41006a89e6d79c1e2eb72618e118f1804f93920387ec74bc

                                                                                                                          SHA512

                                                                                                                          95664cf141d709ecbe8006f4e12f501c204d1fa7a0c104fa339f94506847137562e3dbc40359adc7cb50282320ea58f27b6e5112d32c4c9d73aa777f0508ec0d

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                          Filesize

                                                                                                                          5KB

                                                                                                                          MD5

                                                                                                                          4635c215191dd74e60c3c0a100724b5c

                                                                                                                          SHA1

                                                                                                                          54364d942e049035967fee30df774ead3467221a

                                                                                                                          SHA256

                                                                                                                          5271340d2957ef172073cc59abdb1b63ba0895be187544cd5beace8323bbd7b5

                                                                                                                          SHA512

                                                                                                                          5a4c9bdcbf4d865e98fab0ddef043cce7175472123c176172f33b22303a9cc56c6a848f17687372686592999911800da48ffbdb7057b44a19375d190e4476c9c

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                          Filesize

                                                                                                                          8KB

                                                                                                                          MD5

                                                                                                                          21ca483731e4d1e04eab9983be85f12e

                                                                                                                          SHA1

                                                                                                                          86d7069a393593e1e759096aec31a1062864614c

                                                                                                                          SHA256

                                                                                                                          6f9a3f84ec5398d6e61df4d6f40c20f4037fdb626120781ea8127e0aec384165

                                                                                                                          SHA512

                                                                                                                          f688536313f8d1482969e68d71115a32fb338a603486c9f1cc516ec5cb9e93e4bbb0a26755a06d2a06bf8fb423b4231720955d09bccc91774cb2504cb81b377f

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                          Filesize

                                                                                                                          10KB

                                                                                                                          MD5

                                                                                                                          973e8936850954fb6b59ab42be7c051a

                                                                                                                          SHA1

                                                                                                                          11da6c90b75b71a42c69d0151b8378dd0e0ea299

                                                                                                                          SHA256

                                                                                                                          7df700bd1d5529da4d99fb3f74e978343c27ae993838e14c8de7011e0f768cd2

                                                                                                                          SHA512

                                                                                                                          920f8e995cbe77f06af54901e223a15e01a4e92879d1101e11b05307a4fcc415f3b61a45477509bf00c928d8ff33de47332aedd8d6355a1f8a3719fbcb622bdc

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                          Filesize

                                                                                                                          11KB

                                                                                                                          MD5

                                                                                                                          3d9e49cc01de585ef19a171b6854b1c6

                                                                                                                          SHA1

                                                                                                                          01062d6fa383de3e685c66b35f48825a7151c19a

                                                                                                                          SHA256

                                                                                                                          ce85a9fb96f5e9e616eaa89ffd86515642b27516ea30f8224b03123bd644cb48

                                                                                                                          SHA512

                                                                                                                          af816f93e2e756519a88ef5413ebd0f349f8794ff1fd9d18be87de3ca4922fe06c29584a09c901db8fea21db8764f5e26ca58f5f9bd6dd060d16f62960e99f41

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                          Filesize

                                                                                                                          3KB

                                                                                                                          MD5

                                                                                                                          47eede09cb91b45388b818840f66e2be

                                                                                                                          SHA1

                                                                                                                          cbfe493ac3cf429ed1da846ff9668e70708707ef

                                                                                                                          SHA256

                                                                                                                          820ef76ffc807086c6473fe0fd573e75e1de9f1a5f982230a5a4c8cdbf00b0db

                                                                                                                          SHA512

                                                                                                                          dabf1e1bb32521930af5b3f68f51d75ab2d0489bfe7cc3de050aa1deea428ba807e8d9113090a00a25cc380c507db69dd79374da092ddd132b404bded57dc672

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                          Filesize

                                                                                                                          3KB

                                                                                                                          MD5

                                                                                                                          1a59a61d6429b4b430487bad323e58df

                                                                                                                          SHA1

                                                                                                                          075c3ce875daf6c573a7a76494f75d739e2fe7b8

                                                                                                                          SHA256

                                                                                                                          c547ebea5466454345841d2a7c800ca9d46b9591069f0df7aa84cc3c26772284

                                                                                                                          SHA512

                                                                                                                          f61c6262c5f947cabb64efce2bdb0992c9e9c51bbb9e6cb2087483c2ef77d8d83b8e0603ccb2419bfe1b8a86d4c93fa3f9f75131920b153b9a013a056cb70d99

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                          Filesize

                                                                                                                          3KB

                                                                                                                          MD5

                                                                                                                          2d32701bb1ff166ef2103dc25748eb7c

                                                                                                                          SHA1

                                                                                                                          5a6580c31efd411a73e955aaf8b2afc4e90c8c8c

                                                                                                                          SHA256

                                                                                                                          14d6cc4591a4d8730c10848a151c622c8ef42eb81e6be5831a0c1b6a595ba819

                                                                                                                          SHA512

                                                                                                                          b93a9b00e559732493bcd9e0867434d05c4f574bf270a7419ef72578cffb25f03b1e9eea5dc285d5fb9034ff0919b753631e8de1e338797046a34073beba4511

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe582035.TMP

                                                                                                                          Filesize

                                                                                                                          3KB

                                                                                                                          MD5

                                                                                                                          034492ebb02b9f66217b3bcf00defdec

                                                                                                                          SHA1

                                                                                                                          078db4b78d73817db7c84ed3ff8bef71fd2514ba

                                                                                                                          SHA256

                                                                                                                          63744048cc1ce79ca1f8034dffd52154d9d5847d9b37f64f886c0ed154680f59

                                                                                                                          SHA512

                                                                                                                          074944f130e8f19abe0995b213355779af008cd33e9a95304e52e1110c153ebf009e59ac04496152892fd5163e293e8953efe37c4921a23db0a49ccbd6e99ba7

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                          Filesize

                                                                                                                          16B

                                                                                                                          MD5

                                                                                                                          6752a1d65b201c13b62ea44016eb221f

                                                                                                                          SHA1

                                                                                                                          58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                          SHA256

                                                                                                                          0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                          SHA512

                                                                                                                          9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                          Filesize

                                                                                                                          10KB

                                                                                                                          MD5

                                                                                                                          8b4b16960bc3a5123d3b4e4fb7688316

                                                                                                                          SHA1

                                                                                                                          cd236f72897a2df96e3b681c620408330a9d92c2

                                                                                                                          SHA256

                                                                                                                          777308f3bd1d38e6f04b5d2c4bf6f0d73e390611ada62b84796792bac0f17254

                                                                                                                          SHA512

                                                                                                                          4d856bb6867571a19d20ae0c650e842b2b6b8bfea02d6090d6af827f2155538476f872050b182d4c55de5c7738a1b4bd5d5637c0966331f76fe4c8a1dce09af0

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                          Filesize

                                                                                                                          10KB

                                                                                                                          MD5

                                                                                                                          d0158f883510f77f426f5f8d9c145bba

                                                                                                                          SHA1

                                                                                                                          4d3f3cfd2eba305af16294f8bfaa4401126fe512

                                                                                                                          SHA256

                                                                                                                          5dabef353aebeb94b08813aba654cf55a69d4e9788c53e8a028e5ab1f5285cf1

                                                                                                                          SHA512

                                                                                                                          32001f7727e1f54af7b641564610cdbecc692147aea234720a1d439f9e5ad43cf3af339782e9fc0a745622c3dccbea9e4865215f991ce69100a1fdf7f1933dcc

                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                          Filesize

                                                                                                                          10KB

                                                                                                                          MD5

                                                                                                                          2785972b4f704b43b9c12eb90ec40928

                                                                                                                          SHA1

                                                                                                                          2b5cecc7f01ab5230fd673d1932191c249a33d0e

                                                                                                                          SHA256

                                                                                                                          9c570767e9e4061be2422d14f0e5c8489baa53b1beac2b863e92caba68847e51

                                                                                                                          SHA512

                                                                                                                          f3a5c2ce0c91acb37d6410d23019c5392b7e100aac6ee077fc55497b288a369200c99441d59e8b52190fbbe8dacc42a1d042ecb93c43151b34148c6026735617

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\DRG module.exe

                                                                                                                          Filesize

                                                                                                                          231KB

                                                                                                                          MD5

                                                                                                                          6491e2d6d6777b927812a55cc4f06ed0

                                                                                                                          SHA1

                                                                                                                          54bc384453dce124ac19ffb8d3f8d3d075de4707

                                                                                                                          SHA256

                                                                                                                          1c0485efc5789b3b5f800c2404a07546bb5df2722caf5e65678513989732cd35

                                                                                                                          SHA512

                                                                                                                          24ad59aefb392f02774bcadaf2abd09f25f7fb3d65231536575d432ea68fa05aff367c96d787e10b877e8881bc4c0d38922af88a7e04977bed06131c26a3efd1

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\GUI sub.exe

                                                                                                                          Filesize

                                                                                                                          2.1MB

                                                                                                                          MD5

                                                                                                                          559b286795ce9ddc9d5c2c5a233c1bb1

                                                                                                                          SHA1

                                                                                                                          9e26cfcd8c6c38ff5e69a6bb24af1da8378330f2

                                                                                                                          SHA256

                                                                                                                          76e8a310e7a4e5c4ff6afe4f7833258daa52345005edf844f0e1e14343443ce7

                                                                                                                          SHA512

                                                                                                                          de10b802beb17c3117cc241caf30f2f6212f5bd47d36ec13ed2f20b66209da673924d80fb29ee8aeaaed4e96a865d8a381d918bfaaabe6f384e04d529fb9e85b

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Microsoft picture manager.exe

                                                                                                                          Filesize

                                                                                                                          71KB

                                                                                                                          MD5

                                                                                                                          97314f94428100e9d3aa9194165b8a64

                                                                                                                          SHA1

                                                                                                                          b3867413b8c5b2edb6b693d19e01b4913f430cd8

                                                                                                                          SHA256

                                                                                                                          19d1e724dfdb8dd5c6a5f7d1c276daeb95331a243df566252055c78fd32a7e78

                                                                                                                          SHA512

                                                                                                                          fb5b33a2bb2709568bcb126df8b1cd29bbec9f6e7f8ef205b9a74d9adabdd50cd856f953bc5218e176279150f97b1f194fd71ac796e71bcc3705ed66cd7f2a7a

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\RESA582.tmp

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          016656f3db635a88a3599faac64b02e7

                                                                                                                          SHA1

                                                                                                                          f4051a15aafb1d1923956744b8137875663d2c03

                                                                                                                          SHA256

                                                                                                                          abc4bd25f2fd4b0d05d3ec1a494bad9d75bcdb8dd49b3f32a7ac3a76e8460030

                                                                                                                          SHA512

                                                                                                                          acd37be1c065741a50c277ec4966d311d2894b7d07d38276b8f028f278545bd49174a162255e2e25ed5044b773f9f47462108458b1a7104f11bd4b4b5fdd856e

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\VsdVNTW6f8.bat

                                                                                                                          Filesize

                                                                                                                          231B

                                                                                                                          MD5

                                                                                                                          866fc2c1eaa5a4fb16bae98564e6fa62

                                                                                                                          SHA1

                                                                                                                          cce00f069246eff4497f374402a371306b2ecdaf

                                                                                                                          SHA256

                                                                                                                          1009df2bcdc8a1c34acee00b8fe10ca8bff790d4adaba2ab170516d70cf7e09d

                                                                                                                          SHA512

                                                                                                                          630f9bb8269040aea548269e61f513ee5794f4ec75d404b006e8a5a3f7dea235977533f2206d6937c1d13ceac30bbb0c2b98da574024232278037748d0644839

                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\WIN helper.exe

                                                                                                                          Filesize

                                                                                                                          338KB

                                                                                                                          MD5

                                                                                                                          0587c213be340de28c76fed1a54a6193

                                                                                                                          SHA1

                                                                                                                          5245dc6a39ce5bc1d70eb9e2d03553c0eda96aa4

                                                                                                                          SHA256

                                                                                                                          34d8d72eb638550841d8368ca94e7554e06f4bc38463f985a8405419ca5c5204

                                                                                                                          SHA512

                                                                                                                          d7cef5da673c401ac3c5654557cd2ca86db6213010e6cd7458bb41dfc0bbc87b1e00fc6ba3559da0bec55478ce6c83f0fa9470728db8266b6fffdbabc9968134

                                                                                                                        • C:\Users\Admin\Downloads\Setup.rar

                                                                                                                          Filesize

                                                                                                                          3.5MB

                                                                                                                          MD5

                                                                                                                          d7d6da87577b36237f3164d8a692e34c

                                                                                                                          SHA1

                                                                                                                          fe0764c1e29994acf5b32987310da613892ead64

                                                                                                                          SHA256

                                                                                                                          acda4d4b3f3b1a4b5727b30b508d4ecd64d09d4c498d145dd02dff15b635ef15

                                                                                                                          SHA512

                                                                                                                          259858330dbd9a4adf81e6e9c133d97a760f0f1a1f6c2e8370ea229a57812d7cfd4cf5387a7e8b81eb40b0df87395973b131eb14115ee77b34e58a8176e87819

                                                                                                                        • C:\Users\Admin\Downloads\Setup\Setup.exe

                                                                                                                          Filesize

                                                                                                                          4.2MB

                                                                                                                          MD5

                                                                                                                          5356627600fbc8c4cb6614753084f927

                                                                                                                          SHA1

                                                                                                                          d6267bf3b704582e56166abc17df5f7922b2e8f3

                                                                                                                          SHA256

                                                                                                                          4c5180aca26d11e0a092fc61e21b09a2ee1b3fc11d9bf5f8787dedf09d7789fb

                                                                                                                          SHA512

                                                                                                                          c387871b27380aef2aae41ed09604cdaa69dfeb84dadbcae486de3d1f31c0d51a4d222298b2269d71413a7e2ef5491b5f978fbb455e018a1a86cabd7c960e146

                                                                                                                        • C:\portContainerServer\AgentsavesRuntime.exe

                                                                                                                          Filesize

                                                                                                                          1.8MB

                                                                                                                          MD5

                                                                                                                          437a180db44c659505d08da56b1c5344

                                                                                                                          SHA1

                                                                                                                          63dcc88fc8ca4dc2c25028695b72fc48f9978df2

                                                                                                                          SHA256

                                                                                                                          d72e20d6e093dcbca62d7a6481f598fe753c664655e3ffd5e3dadce4ef807644

                                                                                                                          SHA512

                                                                                                                          fc28c35c86aecf808101692b459d51eba922743677c48127d91fbc7ddb46202621a87f31e460fdd6915b26564a8ac5fe4ff190ae0dcfdb64f709bc193878582a

                                                                                                                        • C:\portContainerServer\PvszTCanD9rbZND.bat

                                                                                                                          Filesize

                                                                                                                          76B

                                                                                                                          MD5

                                                                                                                          5d57944f139a89fba21b26fbe243af33

                                                                                                                          SHA1

                                                                                                                          84854f7343dbce06e71ba134294a2b4b205ead00

                                                                                                                          SHA256

                                                                                                                          7c5d14dc4a70dae0597635e2174355120d57dc073edfd81aeb0868a4f4838f37

                                                                                                                          SHA512

                                                                                                                          f24ed640659669ca6c9f064641947375a1a7436a52ce8806f2d2af7c67ef8b11556a54d23a0fec301f4c51bcd9959a910700056ae334917f20cd8c8d437cd69d

                                                                                                                        • C:\portContainerServer\bpmdutc0M3cJEN2bLwLmjIrQzt9Evn2rH8angtBVEaFmTOq1CfF52scTNAX.vbe

                                                                                                                          Filesize

                                                                                                                          213B

                                                                                                                          MD5

                                                                                                                          73431f1c425302ea7e0ba3aeb106b2ca

                                                                                                                          SHA1

                                                                                                                          1dd176bf1edfbe9f55ea32e07f8bc7c9572fc5cf

                                                                                                                          SHA256

                                                                                                                          373b29289a45f8e71e7b5a51c07430e0717862e5eb670304659c2405b2396e30

                                                                                                                          SHA512

                                                                                                                          091c8d417c2dbb70e2d569e356bdf0df5104ab5892e83d7e064ae0957999fca941a41909fe5d71b2bd7e4d2850d2d63bb59ff0a9ae04d0e8585a1407064135e1

                                                                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\mflka1n1\mflka1n1.0.cs

                                                                                                                          Filesize

                                                                                                                          371B

                                                                                                                          MD5

                                                                                                                          a1dfad59799a5324ad735124842eb710

                                                                                                                          SHA1

                                                                                                                          0391ec104e2a77b1d64e9dce6a85aa46968205b3

                                                                                                                          SHA256

                                                                                                                          0a59960ced1d3b8ef6847f562c2c57d3b6c4770ad9e6b7c3c116d98814cc3601

                                                                                                                          SHA512

                                                                                                                          5cfbdc543dee1eeb312d56f629860e3915d330a749680641924d11c803d6a57847812bedaede6fb77faf1fd2266d863f670285400652393fdc978d9600d78d30

                                                                                                                        • \??\c:\Users\Admin\AppData\Local\Temp\mflka1n1\mflka1n1.cmdline

                                                                                                                          Filesize

                                                                                                                          235B

                                                                                                                          MD5

                                                                                                                          d2f642d0465b475d01187cdda2c9b9b1

                                                                                                                          SHA1

                                                                                                                          bd0321353d5d48448ccb0b59eb7d870bc7f36beb

                                                                                                                          SHA256

                                                                                                                          2d2c4de96642fb651a61962cbcdf4de13391a1492cf5c0c0d7ca1c4f4e409785

                                                                                                                          SHA512

                                                                                                                          738bfb357882d36a70f06056bb024e6b32175e3e7b8c45de10dd819ec43b56f29b996ba3e730aae1993617de3fc6b9a9b572c8dd7d514354def5ecfa813f0d96

                                                                                                                        • \??\c:\Windows\System32\CSC5EFD8DE45F664EE9BD46DCC864F1DFA3.TMP

                                                                                                                          Filesize

                                                                                                                          1KB

                                                                                                                          MD5

                                                                                                                          acf0a5c902f3dd3bd7790cdb4484d7b3

                                                                                                                          SHA1

                                                                                                                          cdebcde6ce451177576b39f24e62b134678daf75

                                                                                                                          SHA256

                                                                                                                          30a40cd52450f1fc314048db7431d96464002bfa5a204d1969c6b563c4715622

                                                                                                                          SHA512

                                                                                                                          9559b21b7acb3ed32bba7556a7c68b034a2e9f784bd818d5731cff6c54d81f954d5babf71d2264a82fe463f1314e36e0e227a63a63cc68a00c3fe6d3b2a66fe8

                                                                                                                        • memory/3812-827-0x0000017E50390000-0x0000017E50391000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3812-825-0x0000017E50390000-0x0000017E50391000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3812-831-0x0000017E50390000-0x0000017E50391000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3812-832-0x0000017E50390000-0x0000017E50391000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3812-833-0x0000017E50390000-0x0000017E50391000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3812-834-0x0000017E50390000-0x0000017E50391000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3812-835-0x0000017E50390000-0x0000017E50391000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3812-836-0x0000017E50390000-0x0000017E50391000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3812-837-0x0000017E50390000-0x0000017E50391000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/3812-826-0x0000017E50390000-0x0000017E50391000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4KB

                                                                                                                        • memory/4044-465-0x000001CB22290000-0x000001CB222D0000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          256KB

                                                                                                                        • memory/4976-753-0x0000000001480000-0x000000000148E000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          56KB

                                                                                                                        • memory/4976-751-0x0000000000A80000-0x0000000000C5A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          1.9MB

                                                                                                                        • memory/4976-759-0x0000000002E80000-0x0000000002E8C000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          48KB

                                                                                                                        • memory/4976-755-0x000000001B8A0000-0x000000001B8BC000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          112KB

                                                                                                                        • memory/4976-757-0x000000001B8C0000-0x000000001B8D8000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          96KB

                                                                                                                        • memory/5084-579-0x0000027054BF0000-0x0000027054C40000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          320KB

                                                                                                                        • memory/5084-569-0x0000027052D10000-0x0000027052D6A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          360KB

                                                                                                                        • memory/5392-501-0x0000000000F80000-0x0000000000F98000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          96KB

                                                                                                                        • memory/5996-356-0x0000000000400000-0x000000000082A000-memory.dmp

                                                                                                                          Filesize

                                                                                                                          4.2MB