Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 01:00

General

  • Target

    94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe

  • Size

    1.8MB

  • MD5

    09109fbe23b94bd3dc2605d7ab550ce3

  • SHA1

    3720744b4f909c4d98756c822c33ffa1f9f77b8b

  • SHA256

    94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1

  • SHA512

    843535d1720736a7325bdf77f46184d8c0c0ff5f45c8e42b2517e021d370a51d4ca91847fc454c1dcf411126449d8e96741b1965861992d5344caf636d5f6ce1

  • SSDEEP

    49152:xrUNrzMgD26tRCQfktF4r43FSnP/MroaSYKCSltdDFBjn:upD26t0WkFq4VGMroaS3CitdvD

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 13 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe
    "C:\Users\Admin\AppData\Local\Temp\94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Users\Admin\AppData\Local\Temp\1008563001\829a7a68d8.exe
        "C:\Users\Admin\AppData\Local\Temp\1008563001\829a7a68d8.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1924
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff88766cc40,0x7ff88766cc4c,0x7ff88766cc58
            5⤵
              PID:100
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,18115337384543402482,4155358160086615678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:2
              5⤵
                PID:2592
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,18115337384543402482,4155358160086615678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2164 /prefetch:3
                5⤵
                  PID:4052
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,18115337384543402482,4155358160086615678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:8
                  5⤵
                    PID:2120
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,18115337384543402482,4155358160086615678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4404
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,18115337384543402482,4155358160086615678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:2336
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3840,i,18115337384543402482,4155358160086615678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4504 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4684
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:4852
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:1016
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 1264
                  4⤵
                  • Program crash
                  PID:960
              • C:\Users\Admin\AppData\Local\Temp\1008565001\c11827d663.exe
                "C:\Users\Admin\AppData\Local\Temp\1008565001\c11827d663.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4760
              • C:\Users\Admin\AppData\Local\Temp\1008566001\bee9f4aafc.exe
                "C:\Users\Admin\AppData\Local\Temp\1008566001\bee9f4aafc.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Checks computer location settings
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                PID:4856
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
                  4⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:2156
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff88766cc40,0x7ff88766cc4c,0x7ff88766cc58
                    5⤵
                      PID:844
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,1305092193098446860,15650193116133450848,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1928 /prefetch:2
                      5⤵
                        PID:4568
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,1305092193098446860,15650193116133450848,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:3
                        5⤵
                          PID:4892
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,1305092193098446860,15650193116133450848,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2244 /prefetch:8
                          5⤵
                            PID:1396
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,1305092193098446860,15650193116133450848,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:3964
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,1305092193098446860,15650193116133450848,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:5032
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4508,i,1305092193098446860,15650193116133450848,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4492 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:2956
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4704,i,1305092193098446860,15650193116133450848,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4700 /prefetch:8
                            5⤵
                              PID:3220
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4936,i,1305092193098446860,15650193116133450848,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4952 /prefetch:8
                              5⤵
                                PID:2004
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                              4⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              PID:1928
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8875246f8,0x7ff887524708,0x7ff887524718
                                5⤵
                                • Checks processor information in registry
                                • Enumerates system info in registry
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4436
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5052066272292472678,6609685954246381080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:2
                                5⤵
                                  PID:1380
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,5052066272292472678,6609685954246381080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:3
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2104
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,5052066272292472678,6609685954246381080,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:8
                                  5⤵
                                    PID:3356
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2212,5052066272292472678,6609685954246381080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:4732
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2212,5052066272292472678,6609685954246381080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:4356
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2212,5052066272292472678,6609685954246381080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:4820
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2212,5052066272292472678,6609685954246381080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:1
                                    5⤵
                                    • Uses browser remote debugging
                                    PID:4068
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsGDHIDHIEGI.exe"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4888
                                  • C:\Users\Admin\DocumentsGDHIDHIEGI.exe
                                    "C:\Users\Admin\DocumentsGDHIDHIEGI.exe"
                                    5⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3240
                              • C:\Users\Admin\AppData\Local\Temp\1008568001\118dd6861b.exe
                                "C:\Users\Admin\AppData\Local\Temp\1008568001\118dd6861b.exe"
                                3⤵
                                • Modifies Windows Defender Real-time Protection settings
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Windows security modification
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2316
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008569041\gok44.ps1"
                                3⤵
                                • Command and Scripting Interpreter: PowerShell
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4028
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5052
                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                            1⤵
                              PID:876
                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                              1⤵
                                PID:2748
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                1⤵
                                  PID:4596
                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                  1⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:540
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4460 -ip 4460
                                  1⤵
                                    PID:4600
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4264
                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                    C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:4984

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\ProgramData\mozglue.dll

                                    Filesize

                                    593KB

                                    MD5

                                    c8fd9be83bc728cc04beffafc2907fe9

                                    SHA1

                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                    SHA256

                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                    SHA512

                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                  • C:\ProgramData\nss3.dll

                                    Filesize

                                    2.0MB

                                    MD5

                                    1cc453cdf74f31e4d913ff9c10acdde2

                                    SHA1

                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                    SHA256

                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                    SHA512

                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                    Filesize

                                    40B

                                    MD5

                                    0cbe49c501b96422e1f72227d7f5c947

                                    SHA1

                                    4b0be378d516669ef2b5028a0b867e23f5641808

                                    SHA256

                                    750530732cba446649e872839c11e7b2a44e9fb5e053fc3b444678a5a8b262ac

                                    SHA512

                                    984ea25c89baf0eb1d9f905841bda39813a94e2d1923dfb42d7165f15c589bd7ff864040ec8f3f682f3c57702498efff15a499f7dc077dd722d84b47cf895931

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                    Filesize

                                    649B

                                    MD5

                                    4d6522069347d589f97feee49a17476d

                                    SHA1

                                    51e1b3a748f33759c4ce7a63c33f5300138fbff9

                                    SHA256

                                    815e593334471f92225e42bd2dc6a89f8db99129796c7be2f2fb00edf1f035c4

                                    SHA512

                                    15ccb73775858110dd95bb0e1a4300ec31601c05f2d94fc3e63e10e9ec990b8dcfc9f44fc45edaf99e351b63b071dbc7d5acc38344e0247329cc8e8e128c4817

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                    Filesize

                                    44KB

                                    MD5

                                    b144cead4b8fac5c5f4e451d6e806595

                                    SHA1

                                    6eebf5db99872fbd635b47ce51b2ec73780fd7de

                                    SHA256

                                    3dc644ef13fe7f43804ec714c9c1652312cf68ff62106f4a6ca24ac7abeb790a

                                    SHA512

                                    385b9b42aa254ef2fca4431bca60a75c802cdf1e9ac77b5939e3818b11003704cb462389f6b3bf658580beb1187753c1a06f98242f7b37d411a78216aabbd080

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    243b359eab6cb1d16335aa5edc49f073

                                    SHA1

                                    96348fdfb7fbb75c23f37c5a7d24bc3b8849a672

                                    SHA256

                                    8804cd38cb55a80b4495a7e0fc0a0f123a7ef80b5aed2b1ddfd4e7e1c4070c14

                                    SHA512

                                    a0fa4cde38aa39a0ede8b1f132fd2768780fd10d582472c0105870c23798edd6cac374fab1195b4ab12ed8b692f241934ea741bb9f8f0ec8e3710402904ca1e3

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                    Filesize

                                    4.0MB

                                    MD5

                                    a2a32e420a51a33c13a72b291d4f86f4

                                    SHA1

                                    aad8420cef89ac7b966abc96d4b662d246a7191f

                                    SHA256

                                    b75f4033b6b398540f19dd58234832b6dda1bb65433ae21291fe20aab83593b9

                                    SHA512

                                    9a3affca3a7aa792bb144e4ae65973e61e602fff9f3deca086dd807dd0f1f1e1c75879204705c11e4e4c21d07feacce27193726bf9b08de2be7711d914959179

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                    Filesize

                                    317B

                                    MD5

                                    c0750997417cdac97cf4d01326dd6183

                                    SHA1

                                    2301180d4184f39527a4eeb34451f7034025a951

                                    SHA256

                                    af7ae95ef1c867be45e8231eef79b234a5df1b767b125680347d2a97b0f71c0b

                                    SHA512

                                    a39104bd8d5316182c6925c89cac5dc600d352d94f5705610bc169731a50c2084b722adf5b69630b39e4f70a8a797af00efc7089f20659b0c73efab1fb084b4d

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                    Filesize

                                    44KB

                                    MD5

                                    a947b9d9c17085febd2b5746b7d9fac3

                                    SHA1

                                    b69bd9171edf24f4ad9ce36a1821f229d79d47ba

                                    SHA256

                                    cb29e34bb54492db9268cc09979cbe7e5ba254a8a18f75e9501009d718a165e2

                                    SHA512

                                    97f9ba689a957e6519b9e914b18ce360286d08b2edd804581b9bdfa51382fcb593ec84c4a49f1472166aa5074909810d874364a7286430e0a36ec0f1fa25e602

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    9bcb6d802b19230cab7bd439dd1f8c74

                                    SHA1

                                    13b78782a148818e0f675535000b51b3bfc1cff1

                                    SHA256

                                    f7565dc5c74d898be6c4cd877f0e172b5f41cb2467a6f9cf591d42aa63b2f09d

                                    SHA512

                                    85e2b58e74e356a0fb2d57c161c24917bcff23ebeac82133a4c9b67fb5a66f234f8c3a570f5ebcda7095cefef5839f59ab4c0645fd84e234a6cacf1a2220ce81

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                    Filesize

                                    1.0MB

                                    MD5

                                    fe993339a25710ebec86c051941d462c

                                    SHA1

                                    1a7a578b7a32bbe2102a789c2321090d406838d1

                                    SHA256

                                    59ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443

                                    SHA512

                                    b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                    Filesize

                                    4.0MB

                                    MD5

                                    d6b0609c4b6edb45553ff9afbfc95e33

                                    SHA1

                                    2697657b75906d3653f48080ec1f3993c07bd8bf

                                    SHA256

                                    eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e

                                    SHA512

                                    db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                    Filesize

                                    329B

                                    MD5

                                    f98081bc8811eec419b8d1ea0ae810d8

                                    SHA1

                                    195d55282f6e28fae307c920f7c6d9f7f631fa03

                                    SHA256

                                    3e9d2f195ad9f02de3d998dc1738801d4a204aa633e3385fe0e0632c0c31262c

                                    SHA512

                                    1af462c25a2c9ff72cefcc833c9b05e3b6e21684d4faf41cfe1977ae5f0a4b7348c35eb3694e499c9514f86b1a3021c9b1ee716d747edc86ae6b47728f6a1961

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\70ead8ef-72be-421e-84f8-5083442211ee.tmp

                                    Filesize

                                    356B

                                    MD5

                                    88949603e84f4f89625b3873d1d85607

                                    SHA1

                                    de97e145b1241f262ce4aa75bba606762fcc7606

                                    SHA256

                                    913c23221eb47e53b5f8fc4caf790abc7250c10c06fa01bb41fb8f7a57059f39

                                    SHA512

                                    054d2ab8249f907b6ad425e1464e3af89f102b54eb488e7cc59c689c6e66c3668d3c8f0378ef56ed0190ee79c1e7dc855fb68c5d906f0ebee9a99b583cc52c9a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Reporting and NEL-journal

                                    Filesize

                                    8KB

                                    MD5

                                    14b52f78bb016286f471696920e88210

                                    SHA1

                                    2242da691bf07220a8f423e4eba11a8c8628b330

                                    SHA256

                                    9dbd4949fa729f7578181089d1ae187942c7d63fecabc954bad661012fb93c52

                                    SHA512

                                    bf7ee29cbc66a4f4754cf69aa302e5473a58c482bf1557b1e7e371515c1f14cee59d87af98a7fa61c5a0301fa0bf3627a4d3867193e91f4c72c217bed28e051b

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                    Filesize

                                    333B

                                    MD5

                                    1e2ee17d383dd87225e82d2b48d14444

                                    SHA1

                                    badff015c09bba4a13f34478ea3707b5e9c8b2be

                                    SHA256

                                    be3b984344f3701b5e0ff4937dec830c990d5e2b34a2780af91b60c51b676654

                                    SHA512

                                    dceaaf60f0e529d158e59f47b351810f540b56915113b91f60667d4623d23904df9061ff9ec6d2ea8eb46d4c1b6026a50a39e756785d70271d33dfd31af32dc1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                    Filesize

                                    308B

                                    MD5

                                    4e7982b86b3d7d916b7722aa3b3f0669

                                    SHA1

                                    ce4e874903cb71d9012cc7654ca7a6ba5e4f7efd

                                    SHA256

                                    cbee1100a2c9add47776b7e416b58a809f6feb9fe458bef8185b0c176b5db340

                                    SHA512

                                    c4dda8b36e90a327061dab901730f47fc23cca129b02a157f1ed0c566a1d6dddf272a4e74d3acbf14eb3a7fac0820387a584db9e19ca299724ed7f3030f891bb

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                    Filesize

                                    317B

                                    MD5

                                    84de6ea913c2c369f90aa8d8bb864b7e

                                    SHA1

                                    d97e0629af149a7cab299d3eebfdb531018cb378

                                    SHA256

                                    924c6cd109b7e677cbb5a5b2251f1c25d672800b97230dacfa709646a1f70a79

                                    SHA512

                                    b9648f3df59fcaa3da8e9fc81cbfc4ab82f6d6a30fa659a2d64f98cf3344b2223588d517ce192586af65eea7ee6195f0f60217f2337f69d3f4d7f416747cf987

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                    Filesize

                                    345B

                                    MD5

                                    0e057bc251f85afdf1a8a50790558bf5

                                    SHA1

                                    f91d45d665a13f3552ef0227e1d44162203e357f

                                    SHA256

                                    1aa0b10c400450bec8ec092bb374bdf735e6fa66da1a062dc32145a8ac2761b5

                                    SHA512

                                    b5caa1de22ada3cecf38a0c1ac9bfd99f058c997096ba539fa1d81deaa93b83c5027dbb43f0e1d43a139306a0bc2b8afef99b987b1b64bad0eae130b51e4291b

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                    Filesize

                                    321B

                                    MD5

                                    c9479ef6ea15896fbcec0b45744c5237

                                    SHA1

                                    ae382a547a1d4fa4a7b53321c137c6cb249a5fc9

                                    SHA256

                                    71cd7187b9d175f0928cd6b893026a129ff91a522c76b5a71cbb7394a3f37c44

                                    SHA512

                                    c5ee14f8587341077758e32f034fbf54773c706ce5fc10ce8878297fae1fcbdb08d3e2ccf93c0242ed40831a42a102189b272459cffec0d380ccf540d4b0c459

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                    Filesize

                                    8KB

                                    MD5

                                    3f2f4003c0567efdfd9697e3380a89fb

                                    SHA1

                                    e037f6290f9278c1381cccb1ce805729bbbb6e24

                                    SHA256

                                    ee77da4662996c5975a90a3e5d03ed47b45ddf93cdb3da7cf5fc26251ad0fa6c

                                    SHA512

                                    40999961844603c86a9a1bbcff40f8d46543cc911356dc034b185116f6298a0c955b697ec4bf72120fa040ed8d02b7351f46c32f73c2d5b2ce8f6bf84a17a02c

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                    Filesize

                                    12KB

                                    MD5

                                    553c0b207e3afc26293f295abe631603

                                    SHA1

                                    2a41ff08d2b9f5483c57aab658c1c9886b5b46e4

                                    SHA256

                                    1f74058cb37578561aaa2d4edafd80c706bb1bc6d250d4d1abf231b41d5caf83

                                    SHA512

                                    632ea593660c3a21e3d3d5556810babfebb59293f3477ae5442113dfc040864db74372b8cfcd07b4e92bf22c25fc428054a3a14ab0882e67778478c1165dbdeb

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                    Filesize

                                    317B

                                    MD5

                                    3023057fdc271ffa90b5b65d0ea38a71

                                    SHA1

                                    be1c33eb6bcaaf4dabbf8cac8e125fdc132801cc

                                    SHA256

                                    1cb2539324692e28527f535ef3083843f7063681fa60aea63e4a98b10b94bcbc

                                    SHA512

                                    a68c69b2c98b737530c0f750bf76203a62c974d03f30303547d38d3abed8e289079b906f02b6dfb8060a906360487c31a5bfe58fe9c1d01fbf99f7b5ac1b7479

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                    Filesize

                                    1KB

                                    MD5

                                    a6c2c5cc285b5d72192ce84ae5e06bcf

                                    SHA1

                                    1efceb3580ea1ddca06d9249cf171b02ffd8d891

                                    SHA256

                                    c6cd34b6557c0d95dcaea8c800dc54f2fddcd49c085e3fb2690ca6edb550838b

                                    SHA512

                                    f5f571fa154e9e51f997c857609dbddbd00e94a999a37531a16bbcb3b5b57bb6ac732c0fa963b27b349c3a600da1435872ec7bf6172f909101555e7046bdc2e8

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                    Filesize

                                    335B

                                    MD5

                                    eceae00a73e0e74ed5ee839346615644

                                    SHA1

                                    14777e78d66e826231302b340ce6e9c8b80f671b

                                    SHA256

                                    0a30f84c0e2211a965b0231e674bce887ef8e87e2ef94f98d5a6fda151378ee0

                                    SHA512

                                    7006cb769266f77b70457ec271188a97c13a2366437497898f189898522be58284e81ebb02af0a4a7e2e0c0d4b2d47616ed3e38c93992052d2e26fc22fe59e87

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                    Filesize

                                    44KB

                                    MD5

                                    1c4b087db879f568ada6d12f7da1d75e

                                    SHA1

                                    74fa63a147e122d585d1ae1396db2a59a7894d5b

                                    SHA256

                                    5cdbf8eee171841d190f5f83879c077645f969d15aadf82fc2c9ec201778b265

                                    SHA512

                                    a8caa059a3bca902ce6682c1d6ff1b5e1bfa070c82ebe72726adf1e018379b65691556452b9a45112bbe6e6661a963149a95a3af1fd7cec5bdef32f74347a7ed

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    fc0840ad6bfb358694dd117f15db9c3f

                                    SHA1

                                    afa01e0f477e7fe385741050f55083f70d24d60a

                                    SHA256

                                    0e8d75eee22aed7708d53eeee904807636ec0c06d792fecb0c319dc0e4644bed

                                    SHA512

                                    92414059cd53e16dc1f0fc10adb402963ba5882053ad247cb58e856acccb15ae1e14e587fec1f445bdcafdbf5858f4e33bbc7edce12e64fff2b19063d6cc23c5

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                    Filesize

                                    4.0MB

                                    MD5

                                    f392cfb66f064d786177e3e4aa71e069

                                    SHA1

                                    89ac88c76352200c2ef25a5c2781387793aface1

                                    SHA256

                                    1ab0e66567997a4aaebfa22beefe66fba317067fc4c78f9032ea0048449bc100

                                    SHA512

                                    4452e232bf9be25e6086465cf18e04d8549a6871779f829a2b62607de3e8add6010b1feba789b86015f39451908e4f12dc6f9420ccee5b781fa6debd2e1d492e

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                    Filesize

                                    14B

                                    MD5

                                    ef48733031b712ca7027624fff3ab208

                                    SHA1

                                    da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                    SHA256

                                    c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                    SHA512

                                    ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                    Filesize

                                    86B

                                    MD5

                                    f732dbed9289177d15e236d0f8f2ddd3

                                    SHA1

                                    53f822af51b014bc3d4b575865d9c3ef0e4debde

                                    SHA256

                                    2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                    SHA512

                                    b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    c2d9eeb3fdd75834f0ac3f9767de8d6f

                                    SHA1

                                    4d16a7e82190f8490a00008bd53d85fb92e379b0

                                    SHA256

                                    1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                                    SHA512

                                    d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    e55832d7cd7e868a2c087c4c73678018

                                    SHA1

                                    ed7a2f6d6437e907218ffba9128802eaf414a0eb

                                    SHA256

                                    a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                                    SHA512

                                    897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    2a73c6d7d0012b6da71f6ba66c5d1260

                                    SHA1

                                    db0e17ae969e96bb50813c080cdaf7ed34be20ab

                                    SHA256

                                    82b68ff2bc5a864004b4c5a00847d66d7cfb6fa86dfaafea9ba1c4d92a8f690f

                                    SHA512

                                    cf24ddaa2c65e76b08ffb544713df28b7c42d0327e816e9d70baeefbf32d15097670ac64f7e6a0156a08b6239ba1c757288984fdd842fa699ef39b4fd36690ed

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c454db9d-d6c2-4300-b0da-32e072502aca.tmp

                                    Filesize

                                    1B

                                    MD5

                                    5058f1af8388633f609cadb75a75dc9d

                                    SHA1

                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                    SHA256

                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                    SHA512

                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                  • C:\Users\Admin\AppData\Local\Temp\1008563001\829a7a68d8.exe

                                    Filesize

                                    4.2MB

                                    MD5

                                    ce1c81d721906475fc878ebd26d09ad4

                                    SHA1

                                    2fd29c1c343af0ffc67441b448e8a101b7f7854e

                                    SHA256

                                    a80ca2e11b0eaa75711ca4b8a002d95f45e8dbaf41101e4dfc52b32ab5d9ddae

                                    SHA512

                                    af61993252d78e5da18d4826ba22e3496aebf9a14af715ff7034d9972b577b5ca4d75dfa0fab515e384dec5f74a27a53d4d25d9423500580f74dcd2c1b5be5ff

                                  • C:\Users\Admin\AppData\Local\Temp\1008564001\CC [server].exe

                                    Filesize

                                    612B

                                    MD5

                                    e3eb0a1df437f3f97a64aca5952c8ea0

                                    SHA1

                                    7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                                    SHA256

                                    38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                                    SHA512

                                    43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                                  • C:\Users\Admin\AppData\Local\Temp\1008565001\c11827d663.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    89a84eb8a83e3072365849af60f40dcc

                                    SHA1

                                    0d22977f6a49a60619e8fca8297ef92cab0ce52c

                                    SHA256

                                    6e05eacb5ba89bf57cbe21ea64b9e8fb72148ecc6624c55e1f82aa2efcee03d6

                                    SHA512

                                    24c2151099b4bcd7b20c56d6e2267551b58b92714ccdae10163f611987d06bca9049c2154412943b42f7d758fe83179b357846fcde382dd6c3e066828bcb4b42

                                  • C:\Users\Admin\AppData\Local\Temp\1008566001\bee9f4aafc.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    f5634fe84a0d50da553341dd8b70f55b

                                    SHA1

                                    ee0ce0583edd4b0093709fb1be3aba975e4f7780

                                    SHA256

                                    33ec7d97e387a484ca822a25143b5d01ddce8ab813200719537702f0931f9e87

                                    SHA512

                                    2211675f740494a7f34971a475281608aeccda6615ec5b709711be3b5e079fa6f64608680ff9ee483c1b2e1a8270c3510c2940a5af4a2563ef12c764ef72dc6c

                                  • C:\Users\Admin\AppData\Local\Temp\1008568001\118dd6861b.exe

                                    Filesize

                                    2.7MB

                                    MD5

                                    f2742a9288b543dfd082fe555fc135e7

                                    SHA1

                                    3324370e94527fcf80ef571f9c1819d59b0b2f23

                                    SHA256

                                    dace3504559fca2ba342fa83836e916775514060f4772cdeb263b91906a23d46

                                    SHA512

                                    8bcd629e3d52f6f89b068169717d060be2a2fad5230d86e5b1844a3c55d8e0830bf331a92d7f6e1e88f2f8b876823f0d9dfcc77f98f6db1ed86fd8daa1c8ad23

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5qv03dgf.qpr.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    09109fbe23b94bd3dc2605d7ab550ce3

                                    SHA1

                                    3720744b4f909c4d98756c822c33ffa1f9f77b8b

                                    SHA256

                                    94a2471c4477560421cd9fb3ff6cba275c459499c11d92436e88d1c11fc56cd1

                                    SHA512

                                    843535d1720736a7325bdf77f46184d8c0c0ff5f45c8e42b2517e021d370a51d4ca91847fc454c1dcf411126449d8e96741b1965861992d5344caf636d5f6ce1

                                  • memory/540-231-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/540-227-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/736-16-0x0000000000EA0000-0x0000000001350000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/736-5-0x0000000000EA0000-0x0000000001350000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/736-3-0x0000000000EA0000-0x0000000001350000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/736-2-0x0000000000EA1000-0x0000000000ECF000-memory.dmp

                                    Filesize

                                    184KB

                                  • memory/736-1-0x0000000076F24000-0x0000000076F26000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/736-0-0x0000000000EA0000-0x0000000001350000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-31-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-410-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-17-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-18-0x0000000000651000-0x000000000067F000-memory.dmp

                                    Filesize

                                    184KB

                                  • memory/1108-19-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-425-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-56-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-392-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-404-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-407-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-29-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-28-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-27-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-84-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-128-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-288-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-422-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-213-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-20-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1108-413-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2316-283-0x0000000000890000-0x0000000000B4E000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2316-287-0x0000000000890000-0x0000000000B4E000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2316-286-0x0000000000890000-0x0000000000B4E000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2316-394-0x0000000000890000-0x0000000000B4E000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2316-401-0x0000000000890000-0x0000000000B4E000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/3240-395-0x00000000000E0000-0x0000000000594000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3240-398-0x00000000000E0000-0x0000000000594000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4028-301-0x0000000005540000-0x0000000005B68000-memory.dmp

                                    Filesize

                                    6.2MB

                                  • memory/4028-359-0x0000000007820000-0x000000000782E000-memory.dmp

                                    Filesize

                                    56KB

                                  • memory/4028-349-0x0000000007650000-0x000000000765A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/4028-351-0x00000000077F0000-0x0000000007801000-memory.dmp

                                    Filesize

                                    68KB

                                  • memory/4028-375-0x0000000007860000-0x0000000007868000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/4028-374-0x0000000007870000-0x000000000788A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/4028-300-0x0000000002980000-0x00000000029B6000-memory.dmp

                                    Filesize

                                    216KB

                                  • memory/4028-373-0x0000000007830000-0x0000000007844000-memory.dmp

                                    Filesize

                                    80KB

                                  • memory/4028-302-0x00000000052E0000-0x0000000005302000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/4028-303-0x0000000005BE0000-0x0000000005C46000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/4028-309-0x0000000005C50000-0x0000000005CB6000-memory.dmp

                                    Filesize

                                    408KB

                                  • memory/4028-350-0x0000000007890000-0x0000000007926000-memory.dmp

                                    Filesize

                                    600KB

                                  • memory/4028-320-0x0000000005DC0000-0x0000000006114000-memory.dmp

                                    Filesize

                                    3.3MB

                                  • memory/4028-322-0x00000000062F0000-0x000000000633C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/4028-321-0x00000000062B0000-0x00000000062CE000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/4028-333-0x0000000006890000-0x00000000068C2000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/4028-334-0x000000006EE10000-0x000000006EE5C000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/4028-344-0x0000000006870000-0x000000000688E000-memory.dmp

                                    Filesize

                                    120KB

                                  • memory/4028-345-0x0000000007500000-0x00000000075A3000-memory.dmp

                                    Filesize

                                    652KB

                                  • memory/4028-346-0x0000000007C90000-0x000000000830A000-memory.dmp

                                    Filesize

                                    6.5MB

                                  • memory/4028-347-0x0000000007610000-0x000000000762A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/4264-416-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4264-418-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4460-352-0x00000000009C0000-0x0000000001602000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/4460-47-0x00000000009C0000-0x0000000001602000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/4460-232-0x00000000009C0000-0x0000000001602000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/4460-146-0x00000000009C0000-0x0000000001602000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/4460-85-0x00000000009C0000-0x0000000001602000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/4460-403-0x00000000009C0000-0x0000000001602000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/4460-59-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                    Filesize

                                    10.4MB

                                  • memory/4460-57-0x00000000009C0000-0x0000000001602000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/4460-58-0x00000000009C0000-0x0000000001602000-memory.dmp

                                    Filesize

                                    12.3MB

                                  • memory/4760-111-0x0000000000D20000-0x00000000011D0000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4760-82-0x0000000000D20000-0x00000000011D0000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4760-129-0x0000000000D20000-0x00000000011D0000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4760-110-0x0000000000D20000-0x00000000011D0000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/4852-406-0x0000000072830000-0x0000000072964000-memory.dmp

                                    Filesize

                                    1.2MB

                                  • memory/4852-405-0x0000000000FF0000-0x0000000001002000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/4856-225-0x0000000000E00000-0x000000000148F000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/4856-348-0x0000000000E00000-0x000000000148F000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/4856-396-0x0000000000E00000-0x000000000148F000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/4856-224-0x0000000000E00000-0x000000000148F000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/4856-147-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                    Filesize

                                    972KB

                                  • memory/4856-145-0x0000000000E00000-0x000000000148F000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/4984-419-0x0000000000FF0000-0x0000000001002000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/5052-30-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/5052-26-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/5052-22-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/5052-23-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/5052-24-0x0000000000650000-0x0000000000B00000-memory.dmp

                                    Filesize

                                    4.7MB