Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2024, 15:03

General

  • Target

    8GK3U_file.exe

  • Size

    1.8MB

  • MD5

    0712d55e16ed25f739ea28840c3b2576

  • SHA1

    5e1432684a5ac9b19103fcd3f69610938613a0a8

  • SHA256

    da5deabcd23ef4803c8d717ef4e35ca108b3907dc06ee3e34c77246b265d940b

  • SHA512

    d9ce501b6a341c6de8cbeff4b628399cf95d76433590e5f3b511e257392bf82db788eab70e8c387ddce0bdd1451998e3563baf12178fb3bb74b269b3387b26bc

  • SSDEEP

    24576:ddJdxwSlH7t0h11CcrkJH8haFYWknV2e1//zwAPunxT3ocFa+o8g9mML5w/85Ybd:pdDlR0xlrkJHsKYWuVwxkdu8cf

Malware Config

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 30 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8GK3U_file.exe
    "C:\Users\Admin\AppData\Local\Temp\8GK3U_file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e79758,0x7fef6e79768,0x7fef6e79778
        3⤵
          PID:2588
        • C:\Windows\system32\ctfmon.exe
          ctfmon.exe
          3⤵
            PID:1896
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1356,i,11845973598980140863,15823549293723893498,131072 /prefetch:2
            3⤵
              PID:2224
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1460 --field-trial-handle=1356,i,11845973598980140863,15823549293723893498,131072 /prefetch:8
              3⤵
                PID:2944
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1356,i,11845973598980140863,15823549293723893498,131072 /prefetch:8
                3⤵
                  PID:1336
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1996 --field-trial-handle=1356,i,11845973598980140863,15823549293723893498,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2396
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2536 --field-trial-handle=1356,i,11845973598980140863,15823549293723893498,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:844
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2548 --field-trial-handle=1356,i,11845973598980140863,15823549293723893498,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:1676
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1500 --field-trial-handle=1356,i,11845973598980140863,15823549293723893498,131072 /prefetch:2
                  3⤵
                    PID:2360
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                  2⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:2920
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6879758,0x7fef6879768,0x7fef6879778
                    3⤵
                      PID:2092
                    • C:\Windows\system32\ctfmon.exe
                      ctfmon.exe
                      3⤵
                        PID:344
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1364,i,9032075830046418188,15669466288280339487,131072 /prefetch:2
                        3⤵
                          PID:1180
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1364,i,9032075830046418188,15669466288280339487,131072 /prefetch:8
                          3⤵
                            PID:1124
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1364,i,9032075830046418188,15669466288280339487,131072 /prefetch:8
                            3⤵
                              PID:1052
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2272 --field-trial-handle=1364,i,9032075830046418188,15669466288280339487,131072 /prefetch:1
                              3⤵
                              • Uses browser remote debugging
                              PID:3000
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2628 --field-trial-handle=1364,i,9032075830046418188,15669466288280339487,131072 /prefetch:1
                              3⤵
                              • Uses browser remote debugging
                              PID:2916
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2636 --field-trial-handle=1364,i,9032075830046418188,15669466288280339487,131072 /prefetch:1
                              3⤵
                              • Uses browser remote debugging
                              PID:2276
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1400 --field-trial-handle=1364,i,9032075830046418188,15669466288280339487,131072 /prefetch:2
                              3⤵
                                PID:2896
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3744 --field-trial-handle=1364,i,9032075830046418188,15669466288280339487,131072 /prefetch:8
                                3⤵
                                  PID:2100
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\AFCBKFHJJJ.exe"
                                2⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:2324
                                • C:\Users\Admin\Documents\AFCBKFHJJJ.exe
                                  "C:\Users\Admin\Documents\AFCBKFHJJJ.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Loads dropped DLL
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  PID:2288
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                    4⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Loads dropped DLL
                                    • Adds Run key to start application
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1508
                                    • C:\Users\Admin\AppData\Local\Temp\1011233001\tpZOod0.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011233001\tpZOod0.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:1952
                                    • C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2352
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 660
                                        6⤵
                                        • Loads dropped DLL
                                        • Program crash
                                        PID:5016
                                    • C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe"
                                      5⤵
                                      • Executes dropped EXE
                                      PID:4836
                                      • C:\Windows\system32\attrib.exe
                                        attrib +H +S C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                        6⤵
                                        • Views/modifies file attributes
                                        PID:4860
                                      • C:\Windows\system32\attrib.exe
                                        attrib +H C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                        6⤵
                                        • Views/modifies file attributes
                                        PID:4868
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks /f /CREATE /TN "MicrosoftEdgeUpdateTaskMachineCoreSC" /TR "C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe" /SC MINUTE
                                        6⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:4900
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell ping 127.0.0.1; del DU1zDwm.exe
                                        6⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4916
                                        • C:\Windows\system32\PING.EXE
                                          "C:\Windows\system32\PING.EXE" 127.0.0.1
                                          7⤵
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          • Runs ping.exe
                                          PID:5064
                                    • C:\Users\Admin\AppData\Local\Temp\1011333001\2a5157aee0.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011333001\2a5157aee0.exe"
                                      5⤵
                                      • Enumerates VirtualBox registry keys
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:300
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 300 -s 656
                                        6⤵
                                        • Loads dropped DLL
                                        • Program crash
                                        PID:3812
                                    • C:\Users\Admin\AppData\Local\Temp\1011334001\51e3557ef6.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011334001\51e3557ef6.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Modifies system certificate store
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2880
                                    • C:\Users\Admin\AppData\Local\Temp\1011335001\f1d2f345cc.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011335001\f1d2f345cc.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3104
                                    • C:\Users\Admin\AppData\Local\Temp\1011337001\6e5e194ef3.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011337001\6e5e194ef3.exe"
                                      5⤵
                                      • Modifies Windows Defender Real-time Protection settings
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Windows security modification
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3900
                                    • C:\Users\Admin\AppData\Local\Temp\1011338001\e88d8feca8.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1011338001\e88d8feca8.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Loads dropped DLL
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4544
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:2452
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:2112
                                • C:\Windows\system32\taskeng.exe
                                  taskeng.exe {7B2672BD-7C93-4D2A-BB1C-8AB37BAE17B3} S-1-5-21-3063565911-2056067323-3330884624-1000:KHBTHJFA\Admin:Interactive:[1]
                                  1⤵
                                  • Loads dropped DLL
                                  PID:2064
                                  • C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                    C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3008
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      3⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      PID:2720
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell ping 127.1.0.1; del MicrosoftEdgeUpdateTaskMachineCoreSC.exe
                                      3⤵
                                      • Drops file in System32 directory
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2316
                                      • C:\Windows\system32\PING.EXE
                                        "C:\Windows\system32\PING.EXE" 127.1.0.1
                                        4⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:2540

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                  Filesize

                                  40B

                                  MD5

                                  9ca337524816226bf5da651706d62f51

                                  SHA1

                                  6f8a551c620e75e45b2340aac6720452d2886a26

                                  SHA256

                                  ba3dc56f607d63a68f065d56b69cefc8ab6dd4991fa972d80a1ff4ee388f4877

                                  SHA512

                                  97d45a79a646fe20a2ac9ef7aa142fe9483d95a6d2d9d007e7043f1b0776fbdf10616ba3fc93acd15404549bdd8c6e58706a76774fba18958dc8c1e76acc6e88

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  979c29c2917bed63ccf520ece1d18cda

                                  SHA1

                                  65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                  SHA256

                                  b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                  SHA512

                                  e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  aefd77f47fb84fae5ea194496b44c67a

                                  SHA1

                                  dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                  SHA256

                                  4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                  SHA512

                                  b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000010.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  60e3f691077715586b918375dd23c6b0

                                  SHA1

                                  476d3eab15649c40c6aebfb6ac2366db50283d1b

                                  SHA256

                                  e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                  SHA512

                                  d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Affiliation Database

                                  Filesize

                                  32KB

                                  MD5

                                  69e3a8ecda716584cbd765e6a3ab429e

                                  SHA1

                                  f0897f3fa98f6e4863b84f007092ab843a645803

                                  SHA256

                                  e0c9f1494a417f356b611ec769b975a4552c4065b0bc2181954fcbb4b3dfa487

                                  SHA512

                                  bb78069c17196da2ce8546046d2c9d9f3796f39b9868b749ecada89445da7a03c9b54a00fcf34a23eb0514c871e026ac368795d2891bbf37e1dc5046c29beaaa

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  48B

                                  MD5

                                  5a70a23bdbe7580b3582e82c17f5191c

                                  SHA1

                                  74ef4e71b23c26ece230377197ca7f254575e4ec

                                  SHA256

                                  9bf3f0c5fd093f6386fa3ddf2bd18a2845bf6992d0712af87ab238a63bff508a

                                  SHA512

                                  1b34fe76ba1f904cf00eecf947052e2d032af4932d610f2c1a83eb4d5213efd675114732cb218e2856718529b8a6bbe239e065146ce15d6e8b320cb75424dd1b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\wasm\index-dir\the-real-index

                                  Filesize

                                  48B

                                  MD5

                                  e8eca32d464fc0a185b9f55b714e2d95

                                  SHA1

                                  abb3fb62cfd42d02ff1f723d4f59bacd3b58a254

                                  SHA256

                                  9df9b82aee74b81bd83cfcff23d0f9db399267a1221b18b0c5d91cf12faf9e28

                                  SHA512

                                  f896ee7cf0cc705821d2b92eddeed97fd0b8d5658afa229ee4c5de01c1356b4aeb2611131d94010b0cfc8321529cf47c7bd7ccb5fea926c0e6b7ba6c10f540e9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Local Storage\leveldb\LOG

                                  Filesize

                                  196B

                                  MD5

                                  2919280ac7b5212f93c93a33d1b5bb20

                                  SHA1

                                  728c78efb91abd9c78bd3d194838c52d0861c2cd

                                  SHA256

                                  bf22948f2245cace77443914599a9db5cb1d581410d89bd9c7e02d49f6890d34

                                  SHA512

                                  337fea579349980ac8c90cf81efd8c31cf790a5e0ed34f90217a81a57566ec7fe9e97b3ba2e319ae7d2d13c7d2185c54e8bcffa5177624e082365080255ab744

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Login Data

                                  Filesize

                                  46KB

                                  MD5

                                  02d2c46697e3714e49f46b680b9a6b83

                                  SHA1

                                  84f98b56d49f01e9b6b76a4e21accf64fd319140

                                  SHA256

                                  522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                  SHA512

                                  60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\LOG

                                  Filesize

                                  204B

                                  MD5

                                  8d1e28074f4cf9fce18805961a6522db

                                  SHA1

                                  9afaeccbdc6bd6a3157a517093e631fb5b1bc3b6

                                  SHA256

                                  54220a25c041a1bac46eca966a8bc4007cf7f2d187913d0c1b06490592102a26

                                  SHA512

                                  0058003410fc414460ed068bd8a5805092df4ce5f3e01734780ece71bdd684fe9a8083764dd1424519d302dd4b46c7e55f5877846dddd49bc4dbb6cc7e16f0bb

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Site Characteristics Database\MANIFEST-000001

                                  Filesize

                                  41B

                                  MD5

                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                  SHA1

                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                  SHA256

                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                  SHA512

                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\LOG

                                  Filesize

                                  192B

                                  MD5

                                  180a834b5b83baf488c4cfce2f950120

                                  SHA1

                                  294b62d6019e0e159fd4a84a57650e8de6cdf695

                                  SHA256

                                  10db300ef93db9869754fb9ac1eb2628744520dd9d8f19e83cf884cdeede971b

                                  SHA512

                                  32ec48ed5e81d065041fcf7979098c7704f12a4eeedb83412b90c7aceef20e08b14532c5611599921c2880da08c13204f64c1bbfb266b9a68ad24a35eb9ffadc

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Visited Links

                                  Filesize

                                  128KB

                                  MD5

                                  7a601c70051e96fa39f0d53285b536e4

                                  SHA1

                                  2e712c59912bbbf8f307a8e4b5a0a155d068860c

                                  SHA256

                                  69af3fc8edb145502d7a843ca00e668fd3e3b637b6d18636814b48ef3f1d0f18

                                  SHA512

                                  b4e402a35c1b8923228c1590df4c0cd6d43a2f74740f0b48da8ef4d3e189732d57f24b0d4bdb93b2d7e702aceb81e4d0c0d2e4940f3d539537fa27d917ee38e6

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Web Data

                                  Filesize

                                  92KB

                                  MD5

                                  38d0701f40a0ed11976996df8655e795

                                  SHA1

                                  6c5d78ee63a4f094ef36a212a50904be4c7e97fb

                                  SHA256

                                  bbe3a1d82b05be784007e55fd93302df8694e02b93d28db0b23c6ec4989f0374

                                  SHA512

                                  9857bd1254c60dcd654c27158f933a0a5f14780d2a89c05a8cf0c12577a5530f9161fffed793a2f5eff65abad07dc7a2d0eb1dd31ad29affb6df435078d878f2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                  Filesize

                                  14B

                                  MD5

                                  9eae63c7a967fc314dd311d9f46a45b7

                                  SHA1

                                  caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                                  SHA256

                                  4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                                  SHA512

                                  bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\wasm\index

                                  Filesize

                                  24B

                                  MD5

                                  54cb446f628b2ea4a5bce5769910512e

                                  SHA1

                                  c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                  SHA256

                                  fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                  SHA512

                                  8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\wasm\index-dir\the-real-index

                                  Filesize

                                  48B

                                  MD5

                                  6f9a59dd5eb54329b08fb7e7524ddc7a

                                  SHA1

                                  b56e693f78aa2ce86b822a4555b5cb5b851cb36e

                                  SHA256

                                  427558203c1bc169e92dfb84414c965019f19bb7d9103e6dbce3fcc94f540b4d

                                  SHA512

                                  646ff05fccef6ae350de15bbaae7cbf45c0b78b95a60b7a44e53cfd057dc9fb779cab0103eed46b56457095869514256346b783bec208392a559f2658af38a2b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\000003.log

                                  Filesize

                                  76B

                                  MD5

                                  cc4a8cff19abf3dd35d63cff1503aa5f

                                  SHA1

                                  52af41b0d9c78afcc8e308db846c2b52a636be38

                                  SHA256

                                  cc5dacf370f324b77b50dddf5d995fd3c7b7a587cb2f55ac9f24c929d0cd531a

                                  SHA512

                                  0e9559cda992aa2174a7465745884f73b96755008384d21a0685941acf099c89c8203b13551de72a87b8e23cdaae3fa513bc700b38e1bf3b9026955d97920320

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\LOG

                                  Filesize

                                  193B

                                  MD5

                                  e52b13b8c5948516a50874a401f25ddf

                                  SHA1

                                  d333fbc8bc335b7fc06b17ddd7fe19f143e83345

                                  SHA256

                                  b840cda51483981dffab02d4b3d898c184e5cf117f996d3b344b9c65d4332a1c

                                  SHA512

                                  e610a682f87e13057fe03a8e6eed665200699c6a208ebe024c75d1494dd81ea3215afe51e183629a5d8c7853e20fef83845dfb10f5be0e92e6ab1214e2849981

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Favicons

                                  Filesize

                                  20KB

                                  MD5

                                  3eea0768ded221c9a6a17752a09c969b

                                  SHA1

                                  d17d8086ed76ec503f06ddd0ac03d915aec5cdc7

                                  SHA256

                                  6923fd51e36b8fe40d6d3dd132941c5a693b02f6ae4d4d22b32b5fedd0e7b512

                                  SHA512

                                  fb5c51adf5a5095a81532e3634f48f5aedb56b7724221f1bf1ccb626cab40f87a3b07a66158179e460f1d0e14eeb48f0283b5df6471dd7a6297af6e8f3efb1f9

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\History

                                  Filesize

                                  148KB

                                  MD5

                                  90a1d4b55edf36fa8b4cc6974ed7d4c4

                                  SHA1

                                  aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                  SHA256

                                  7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                  SHA512

                                  ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Local Storage\leveldb\LOG

                                  Filesize

                                  197B

                                  MD5

                                  8d3164236bc6082ea01d8872f9372fce

                                  SHA1

                                  7b73bcd867ca9f83168611977719c2a37375bffc

                                  SHA256

                                  53512efc654e49f3b3b2f876884b5d8cf4c1be3b7bb74832c4d6febb7e3ad335

                                  SHA512

                                  18ee8422a296682487ab43a8726e16858e0505cd8d612251420ac2b46dc237a05e77d3403512a2a8b913ed7cb1ad2a39523cf2eee60ede9c12d9e85767104d6e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000002.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  206702161f94c5cd39fadd03f4014d98

                                  SHA1

                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                  SHA256

                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                  SHA512

                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000003.log

                                  Filesize

                                  40B

                                  MD5

                                  148079685e25097536785f4536af014b

                                  SHA1

                                  c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                                  SHA256

                                  f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                                  SHA512

                                  c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  46295cac801e5d4857d09837238a6394

                                  SHA1

                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                  SHA256

                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                  SHA512

                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\LOG

                                  Filesize

                                  205B

                                  MD5

                                  7dc5d8fc55626469ce316b9d5bfa7905

                                  SHA1

                                  9c50dc01ad9e7fe817420df258ddb5bb1eceffc9

                                  SHA256

                                  7a51ae7e91f1f2fdd2ea8699c35e78ef4a05a19b13d7443e1ba88a6f8edd697e

                                  SHA512

                                  9d379b69925db273e3fc823ab425dfadfdad64a895c5863d211851dfd044168497b2e0396074d517f43ca9ade410cbc90187bb695f3f2210c2042981bea5c8e4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\000003.log

                                  Filesize

                                  46B

                                  MD5

                                  90881c9c26f29fca29815a08ba858544

                                  SHA1

                                  06fee974987b91d82c2839a4bb12991fa99e1bdd

                                  SHA256

                                  a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                                  SHA512

                                  15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\000004.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  6752a1d65b201c13b62ea44016eb221f

                                  SHA1

                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                  SHA256

                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                  SHA512

                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\LOG

                                  Filesize

                                  193B

                                  MD5

                                  f76e2c9ac78c9cb2ef01b62b35f8b25b

                                  SHA1

                                  93a22ae57b90597911df1a8147e7f26e876387e5

                                  SHA256

                                  ec9df5983b40660364ed5d7c82d03b975cb8f9f97049260df600f5ef35221639

                                  SHA512

                                  86194c32ddfa16af8c4b9b6431e2df7cf8dc8226d118a3a899574f6c8d779d28c19522bfd0f19f8134624d8f800af4092883d04a5260435f32bfeb8a73778f81

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\MANIFEST-000002

                                  Filesize

                                  50B

                                  MD5

                                  22bf0e81636b1b45051b138f48b3d148

                                  SHA1

                                  56755d203579ab356e5620ce7e85519ad69d614a

                                  SHA256

                                  e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97

                                  SHA512

                                  a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Visited Links

                                  Filesize

                                  128KB

                                  MD5

                                  347f7a5b6db48934136ee7bdb08b1c3a

                                  SHA1

                                  a0eab0537682841c1dd3806ba27da88ef08915e1

                                  SHA256

                                  aede0ea61abc17f70cfe02f6d74debd82e84537bfdc1f51becfd4e98d5d0d6f6

                                  SHA512

                                  4464ad8a592fd9cdc9b6fbe9eec0e6b5088a1432cf887eb6f1d2fa83b569dc635ba2d56d68f40bc7964d9654c34dde28ef5e93723de72717004052223aa8106b

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\shared_proto_db\metadata\000003.log

                                  Filesize

                                  126B

                                  MD5

                                  75fd43d5022bdd2d2627d6944561b2f6

                                  SHA1

                                  a23b313546c837e097f8900b207b9aebcf67acee

                                  SHA256

                                  3363fa9a21dc4db7dc25aa12fa1e9f4c42cf3d07a21814dc37e2a587462564a4

                                  SHA512

                                  624e947801c3c24ea5eac7b6c193dbffe2774b0c090ab37c9862ec9a8e366aca0c00dcf5ef63c77de40eb5d2af248a24e0f70a8395ba9671c33023a88fcc8a29

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\shared_proto_db\metadata\LOG

                                  Filesize

                                  200B

                                  MD5

                                  c4a8d70fa1c7f3f19039b3f9e74c2a36

                                  SHA1

                                  36c3bb6a8929f7253ff61ec0acc36e2d839abc7d

                                  SHA256

                                  e14412478a3831448faeb07c7939357631453a62d90bd38cd0ab01c06470ce99

                                  SHA512

                                  f6a52b7651444c871a5ff0ce6b5aab21b82776d76bad7f55d0bc00f8caad4263771d5ae411190bb5005e653d362cdae4e5d9ed6a18627416baae1a765585b640

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                  Filesize

                                  86B

                                  MD5

                                  f732dbed9289177d15e236d0f8f2ddd3

                                  SHA1

                                  53f822af51b014bc3d4b575865d9c3ef0e4debde

                                  SHA256

                                  2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                  SHA512

                                  b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                  Filesize

                                  2B

                                  MD5

                                  99914b932bd37a50b983c5e7c90ae93b

                                  SHA1

                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                  SHA256

                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                  SHA512

                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IAE3FJ0M\download[1].htm

                                  Filesize

                                  1B

                                  MD5

                                  cfcd208495d565ef66e7dff9f98764da

                                  SHA1

                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                  SHA256

                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                  SHA512

                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                • C:\Users\Admin\AppData\Local\Temp\1011233001\tpZOod0.exe

                                  Filesize

                                  217KB

                                  MD5

                                  98da391545b4823ca67e6cc3a927dae9

                                  SHA1

                                  d2f66837884d6d65dfe21372501cc7ba1d91ef29

                                  SHA256

                                  12862b60140f019b0c251da7be59caf90d93eca6a30d016609cf2ff1da4652a7

                                  SHA512

                                  59130547c169768310d57c075f2cec01a71704e9658955ef8eb1c6b2c30a24a801623f189eac14a84357aa597f5d5c96c5c9f8e96ee4ddf7bcf911dcf6bcb7b9

                                • C:\Users\Admin\AppData\Local\Temp\1011308001\NK4PJqi.exe

                                  Filesize

                                  1.5MB

                                  MD5

                                  03933b44701e2688a19b6fe5980526b7

                                  SHA1

                                  456f586dffa20cc847b3a1f86c2fc958e9cea325

                                  SHA256

                                  04510f9d11f433e48517273b05f3f800d73c16bca0b2b4a9afdaf3612550239e

                                  SHA512

                                  bb1e6d2e1ffc8ab728295ac07512db3f6a08e0c7f9ec70e65ec75591bb9f697781d0df2096d7f9fc9a4b60b62d427acef46bd9105d713a84f91d33db3bec5d96

                                • C:\Users\Admin\AppData\Local\Temp\1011316001\DU1zDwm.exe

                                  Filesize

                                  2.2MB

                                  MD5

                                  4c64aec6c5d6a5c50d80decb119b3c78

                                  SHA1

                                  bc97a13e661537be68863667480829e12187a1d7

                                  SHA256

                                  75c7692c0f989e63e14c27b4fb7d25f93760068a4ca4e90fa636715432915253

                                  SHA512

                                  9054e3c8306999fe851b563a826ca7a87c4ba78c900cd3b445f436e8406f581e5c3437971a1f1dea3f5132c16a1b36c2dd09f2c97800d28e7157bd7dc3ac3e76

                                • C:\Users\Admin\AppData\Local\Temp\1011333001\2a5157aee0.exe

                                  Filesize

                                  4.3MB

                                  MD5

                                  0a6f4c50233fe931d5943619e5f4bf7c

                                  SHA1

                                  de3e6aebeca2f26291fa9cf235751353fc4c4854

                                  SHA256

                                  5ca080ca1f535a4d32d82ef5e8e6325498626b3004e7ae80878e52f2472235aa

                                  SHA512

                                  534cbf22f6d28105165155f21f1538d8dcd961d164dc7c8059fc456dfe0cb8335d843216e2e60e37ff69d9ce6b164124eee4306dd91ba5f9b8a0bd11c7a898cc

                                • C:\Users\Admin\AppData\Local\Temp\1011334001\51e3557ef6.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  53a9c0f3e75e265a6ad207177da6052b

                                  SHA1

                                  f3e98b577710e21a350fba2a0c35aeb5f7ebbad4

                                  SHA256

                                  681c8a530105b233c88c772aba230ec7585824648f17701ec2e70a5db91c40f3

                                  SHA512

                                  c1b898a6344bba20de74fdfa0c1f784fed3854b62e2f5f47ab969af98cc737cf8017774cdabfd921dc152c01b49c4a10c6894bddc77a596a135cfe7b4c629e40

                                • C:\Users\Admin\AppData\Local\Temp\1011335001\f1d2f345cc.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  5bcb10d152757428038b0956ea9d43aa

                                  SHA1

                                  23127c250018e6f6f0c0b66a706ad23de5f7975c

                                  SHA256

                                  4f2c02768e729e0d4e0d4cd89f7125820376b6403d27ea4371faa7d32265295e

                                  SHA512

                                  5cd42ccbc5ccdc84cc3298008beec7e09d973ef011d9b938cd2ae48a2c844a80eb2b848ce4ae5a2b5dbdc74916ff3587e7d32efb94b8ecf8cf61ff1e3808ab69

                                • C:\Users\Admin\AppData\Local\Temp\1011337001\6e5e194ef3.exe

                                  Filesize

                                  2.7MB

                                  MD5

                                  b7048d68a889d02ea88628282d662f25

                                  SHA1

                                  701afe061d054b6730a04cdc805018f72cc09236

                                  SHA256

                                  ed8749cf1bd0381e2f9cdff79cce70b07bebd2588f2da6f65175042f0327b37e

                                  SHA512

                                  eec13aa6de8c0d5728b7ed29958c55d9b1e2e71f568d8a00d1b08c53ab8cc734a3f9cd3c0d43b276be340bed70b26e4c941bd8cf85c9ca6c2ba370216f550516

                                • C:\Users\Admin\AppData\Local\Temp\1011338001\e88d8feca8.exe

                                  Filesize

                                  1.9MB

                                  MD5

                                  f960fd84b7f7a8d057db1f2ca283a76d

                                  SHA1

                                  8eb8a21e6e8ca62f37f86f21aca1d4bdbde9d6d0

                                  SHA256

                                  9dff8d5faabfd081c11d419c2f5b8501e3f173e0001f1fe8d3aeadd1d0d5392d

                                  SHA512

                                  2d6e886e69047068de4d716c32583fa17f6ebefd6ef69cf66b5fe9586d6c459554a372242253172b582d772a49e10df138acefc5cdacf92d501f69ac35716de3

                                • C:\Users\Admin\AppData\Local\Temp\Cab8D34.tmp

                                  Filesize

                                  70KB

                                  MD5

                                  49aebf8cbd62d92ac215b2923fb1b9f5

                                  SHA1

                                  1723be06719828dda65ad804298d0431f6aff976

                                  SHA256

                                  b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                  SHA512

                                  bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                • C:\Users\Admin\AppData\Local\Temp\Tar8D66.tmp

                                  Filesize

                                  181KB

                                  MD5

                                  4ea6026cf93ec6338144661bf1202cd1

                                  SHA1

                                  a1dec9044f750ad887935a01430bf49322fbdcb7

                                  SHA256

                                  8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                  SHA512

                                  6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  57f70d7468cb09380f70ad4812cf8ccd

                                  SHA1

                                  cdd3d4f5e243f842b626f05d42ebc44591f4a48f

                                  SHA256

                                  f7cbd0e34cb5ce29b7466c4b8381efce3d2f86a01cb23566c2b3a86a4f7b1154

                                  SHA512

                                  34dc0df30047c3d970d90a34293691105a21ec6058623ceb5ca19351054c99a0cb05a61f43096834df30db24a1e763388c308fd906c5519cbe62eebb838e69fd

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NKBJRQF84M9M84U7Z5J4.temp

                                  Filesize

                                  7KB

                                  MD5

                                  ab3acd6193d1aa26948e093603a24018

                                  SHA1

                                  aaf6957f63a33a2fe5784d2db31cf64baf5c14dd

                                  SHA256

                                  745894291a6260fdb21791b9c60430860dcc4199614ca85b86f3d9c42b6c0de9

                                  SHA512

                                  5146ca928c2b5de67f90777573dfa5644d2fefe984a09f79c21e922013cffb27dc4a45232dc2a33e733ae564626a4663f73464b3aad28c5109dcb3208e47b8a6

                                • memory/300-1781-0x0000000000DF0000-0x0000000001A75000-memory.dmp

                                  Filesize

                                  12.5MB

                                • memory/300-1956-0x0000000000DF0000-0x0000000001A75000-memory.dmp

                                  Filesize

                                  12.5MB

                                • memory/300-1800-0x0000000000DF0000-0x0000000001A75000-memory.dmp

                                  Filesize

                                  12.5MB

                                • memory/1508-1829-0x0000000006C80000-0x000000000732B000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/1508-1799-0x0000000006C80000-0x0000000007905000-memory.dmp

                                  Filesize

                                  12.5MB

                                • memory/1508-1814-0x0000000006C80000-0x000000000732B000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/1508-1815-0x0000000006C80000-0x000000000732B000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/1508-1797-0x0000000006C80000-0x0000000007119000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1508-1746-0x0000000000840000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1508-1796-0x0000000006C80000-0x0000000007119000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1508-536-0x0000000000840000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1508-1897-0x0000000006560000-0x0000000006814000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/1508-1842-0x0000000006560000-0x0000000006814000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/1508-1780-0x0000000006C80000-0x0000000007905000-memory.dmp

                                  Filesize

                                  12.5MB

                                • memory/1508-1828-0x0000000006C80000-0x000000000732B000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/1508-1822-0x0000000006C80000-0x0000000007119000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1508-1820-0x0000000006C80000-0x0000000007119000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/1952-551-0x0000000000250000-0x0000000000256000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/1952-550-0x0000000000F00000-0x0000000000F40000-memory.dmp

                                  Filesize

                                  256KB

                                • memory/2288-535-0x00000000069E0000-0x0000000006E89000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2288-534-0x00000000069E0000-0x0000000006E89000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2288-538-0x0000000001220000-0x00000000016C9000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2288-522-0x0000000001220000-0x00000000016C9000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2316-1939-0x000000001B930000-0x000000001BC12000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/2316-1941-0x0000000001D10000-0x0000000001D18000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/2324-521-0x0000000002080000-0x0000000002529000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2324-555-0x0000000002080000-0x0000000002529000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2352-588-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-598-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-594-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-592-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-602-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-1760-0x00000000053F0000-0x00000000054A6000-memory.dmp

                                  Filesize

                                  728KB

                                • memory/2352-1761-0x00000000009B0000-0x00000000009FC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/2352-1766-0x0000000004290000-0x00000000042E4000-memory.dmp

                                  Filesize

                                  336KB

                                • memory/2352-590-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-586-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-584-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-567-0x0000000000A30000-0x0000000000BBC000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/2352-568-0x0000000004EE0000-0x0000000005024000-memory.dmp

                                  Filesize

                                  1.3MB

                                • memory/2352-604-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-606-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-578-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-569-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-608-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-580-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-610-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-596-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-600-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-576-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-574-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-582-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-570-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2352-572-0x0000000004EE0000-0x000000000501F000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2880-1798-0x00000000003B0000-0x0000000000849000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/2880-1906-0x00000000003B0000-0x0000000000849000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/2880-1823-0x00000000003B0000-0x0000000000849000-memory.dmp

                                  Filesize

                                  4.6MB

                                • memory/2892-242-0x00000000009C0000-0x0000000001071000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/2892-2-0x00000000009C1000-0x00000000009D8000-memory.dmp

                                  Filesize

                                  92KB

                                • memory/2892-295-0x00000000009C0000-0x0000000001071000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/2892-524-0x00000000009C0000-0x0000000001071000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/2892-1-0x0000000077880000-0x0000000077882000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2892-308-0x00000000009C0000-0x0000000001071000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/2892-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                  Filesize

                                  972KB

                                • memory/2892-3-0x00000000009C0000-0x0000000001071000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/2892-512-0x00000000009C0000-0x0000000001071000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/2892-0-0x00000000009C0000-0x0000000001071000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/3104-1816-0x00000000003C0000-0x0000000000A6B000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/3104-1819-0x00000000003C0000-0x0000000000A6B000-memory.dmp

                                  Filesize

                                  6.7MB

                                • memory/3900-1844-0x0000000001360000-0x0000000001614000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/3900-1910-0x0000000001360000-0x0000000001614000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/3900-1908-0x0000000001360000-0x0000000001614000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/3900-1845-0x0000000001360000-0x0000000001614000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/3900-1843-0x0000000001360000-0x0000000001614000-memory.dmp

                                  Filesize

                                  2.7MB

                                • memory/4916-1768-0x0000000002250000-0x0000000002258000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/4916-1767-0x000000001B600000-0x000000001B8E2000-memory.dmp

                                  Filesize

                                  2.9MB