Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-12-2024 09:36

General

  • Target

    954c129f2e83fc13a5064b626a6588f25badd76fdab71dff8218416dcfb14972.exe

  • Size

    1.8MB

  • MD5

    878ce67b39a161328729707ace72b131

  • SHA1

    0022266e6b123fc7c0147d3085d75ec10ab10359

  • SHA256

    954c129f2e83fc13a5064b626a6588f25badd76fdab71dff8218416dcfb14972

  • SHA512

    a5357a3b150e197981baf1d4e837b62ef2714d38426b117382591b04a3930dd7826563faabf8cb7c777dd9f18ed26966a1dab51ded1a17ac7b9b73ff786ca95f

  • SSDEEP

    49152:J6uo5OzZtc01YrI9Lx1YtkhLERAo1kiVj14:DztcFkhLK1ko1

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 11 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 5 IoCs
  • Executes dropped EXE 21 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3520
      • C:\Users\Admin\AppData\Local\Temp\954c129f2e83fc13a5064b626a6588f25badd76fdab71dff8218416dcfb14972.exe
        "C:\Users\Admin\AppData\Local\Temp\954c129f2e83fc13a5064b626a6588f25badd76fdab71dff8218416dcfb14972.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2972
        • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
          "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1148
          • C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe
            "C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3268
            • C:\Windows\System32\certutil.exe
              "C:\Windows\System32\certutil.exe" -silent -importPFX -p "" -f "C:\Users\Admin\AppData\Local\Temp\tmpEEE6.tmp"
              5⤵
                PID:4772
            • C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe
              "C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:1064
              • C:\Users\Admin\AppData\Local\Temp\onefile_1064_133784697957361303\l4.exe
                C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe
                5⤵
                • Drops startup file
                • Executes dropped EXE
                • Loads dropped DLL
                PID:4412
            • C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe
              "C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"
              4⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Drops startup file
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3056
            • C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe
              "C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"
              4⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Drops startup file
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4292
            • C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe
              "C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe"
              4⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:2156
            • C:\Users\Admin\AppData\Local\Temp\1006190001\ee72178c01.exe
              "C:\Users\Admin\AppData\Local\Temp\1006190001\ee72178c01.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3716
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                5⤵
                • Uses browser remote debugging
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5092
                • C:\Program Files\Google\Chrome\Application\original.exe
                  "C:\Program Files\Google\Chrome\Application\original.exe" --remote-debugging-port=9229 --profile-directory=
                  6⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:2988
                  • C:\Program Files\Google\Chrome\Application\original.exe
                    "C:\Program Files\Google\Chrome\Application\original.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd89c3cc40,0x7ffd89c3cc4c,0x7ffd89c3cc58
                    7⤵
                      PID:3840
                    • C:\Program Files\Google\Chrome\Application\original.exe
                      "C:\Program Files\Google\Chrome\Application\original.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1836,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1832 /prefetch:2
                      7⤵
                        PID:4584
                      • C:\Program Files\Google\Chrome\Application\original.exe
                        "C:\Program Files\Google\Chrome\Application\original.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2152 /prefetch:3
                        7⤵
                          PID:4832
                        • C:\Program Files\Google\Chrome\Application\original.exe
                          "C:\Program Files\Google\Chrome\Application\original.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2476 /prefetch:8
                          7⤵
                            PID:116
                          • C:\Program Files\Google\Chrome\Application\original.exe
                            "C:\Program Files\Google\Chrome\Application\original.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:1
                            7⤵
                            • Uses browser remote debugging
                            PID:3244
                          • C:\Program Files\Google\Chrome\Application\original.exe
                            "C:\Program Files\Google\Chrome\Application\original.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:1
                            7⤵
                            • Uses browser remote debugging
                            PID:520
                          • C:\Program Files\Google\Chrome\Application\original.exe
                            "C:\Program Files\Google\Chrome\Application\original.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3732,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4464 /prefetch:1
                            7⤵
                            • Uses browser remote debugging
                            PID:324
                          • C:\Program Files\Google\Chrome\Application\original.exe
                            "C:\Program Files\Google\Chrome\Application\original.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4844,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4888 /prefetch:8
                            7⤵
                              PID:880
                            • C:\Program Files\Google\Chrome\Application\original.exe
                              "C:\Program Files\Google\Chrome\Application\original.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4792 /prefetch:8
                              7⤵
                                PID:3208
                              • C:\Program Files\Google\Chrome\Application\original.exe
                                "C:\Program Files\Google\Chrome\Application\original.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4660,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4252 /prefetch:8
                                7⤵
                                  PID:5360
                                • C:\Program Files\Google\Chrome\Application\original.exe
                                  "C:\Program Files\Google\Chrome\Application\original.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4880,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4800 /prefetch:8
                                  7⤵
                                    PID:5420
                                  • C:\Program Files\Google\Chrome\Application\original.exe
                                    "C:\Program Files\Google\Chrome\Application\original.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4972,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5204 /prefetch:8
                                    7⤵
                                      PID:5472
                                    • C:\Program Files\Google\Chrome\Application\original.exe
                                      "C:\Program Files\Google\Chrome\Application\original.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4640,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5012 /prefetch:8
                                      7⤵
                                        PID:5856
                                      • C:\Program Files\Google\Chrome\Application\original.exe
                                        "C:\Program Files\Google\Chrome\Application\original.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5192,i,8182559012414002082,2552264470328742783,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5352 /prefetch:2
                                        7⤵
                                        • Uses browser remote debugging
                                        PID:5628
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                    5⤵
                                    • Uses browser remote debugging
                                    • Enumerates system info in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                    • Suspicious use of FindShellTrayWindow
                                    PID:1116
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8e3646f8,0x7ffd8e364708,0x7ffd8e364718
                                      6⤵
                                      • Checks processor information in registry
                                      • Enumerates system info in registry
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2856
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,10443946715186829052,11102354258815553094,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:2
                                      6⤵
                                        PID:5352
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,10443946715186829052,11102354258815553094,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:3
                                        6⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5368
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,10443946715186829052,11102354258815553094,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:8
                                        6⤵
                                          PID:5380
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2172,10443946715186829052,11102354258815553094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:5616
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2172,10443946715186829052,11102354258815553094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:5640
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2172,10443946715186829052,11102354258815553094,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:3232
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2172,10443946715186829052,11102354258815553094,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:1
                                          6⤵
                                          • Uses browser remote debugging
                                          PID:3408
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\IJDGCAEBFI.exe"
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3460
                                        • C:\Users\Admin\Documents\IJDGCAEBFI.exe
                                          "C:\Users\Admin\Documents\IJDGCAEBFI.exe"
                                          6⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5936
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                            7⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:4616
                                    • C:\Users\Admin\AppData\Local\Temp\1006191001\1960939e42.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1006191001\1960939e42.exe"
                                      4⤵
                                      • Modifies Windows Defender Real-time Protection settings
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Windows security modification
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1420
                                • C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe"
                                  2⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:1604
                                  • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
                                    "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
                                    3⤵
                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                    • Drops startup file
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4780
                                • C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:4352
                                • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
                                  "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:4188
                                • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
                                  "C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:6108
                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                1⤵
                                  PID:4056
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                  1⤵
                                    PID:3032
                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:6124
                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5384
                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                    C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                    1⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5668
                                  • C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
                                    C:\Users\Admin\AppData\Local\Temp\7725ce688f\Gxtuum.exe
                                    1⤵
                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6136

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\ProgramData\mozglue.dll

                                    Filesize

                                    593KB

                                    MD5

                                    c8fd9be83bc728cc04beffafc2907fe9

                                    SHA1

                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                    SHA256

                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                    SHA512

                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                    Filesize

                                    649B

                                    MD5

                                    343a852f877248235f362e54cc72fa5c

                                    SHA1

                                    feea7aa06b8d0e98d4304a636eaea33d9b60234f

                                    SHA256

                                    05d7ba2c11f11464ec527e3f4a6ae98c19dd09f9f04934f0147647cb3133c282

                                    SHA512

                                    ced67fd5a93e23538a65afa8daf78357e6619f3c2efe9e98b310c14d0c4460466b3beeb07db9e405548fd618391ec73bc13572f315de13a6a035cb7f88fb75f1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json

                                    Filesize

                                    851B

                                    MD5

                                    07ffbe5f24ca348723ff8c6c488abfb8

                                    SHA1

                                    6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                    SHA256

                                    6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                    SHA512

                                    7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json

                                    Filesize

                                    854B

                                    MD5

                                    4ec1df2da46182103d2ffc3b92d20ca5

                                    SHA1

                                    fb9d1ba3710cf31a87165317c6edc110e98994ce

                                    SHA256

                                    6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                    SHA512

                                    939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    c2d9eeb3fdd75834f0ac3f9767de8d6f

                                    SHA1

                                    4d16a7e82190f8490a00008bd53d85fb92e379b0

                                    SHA256

                                    1e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66

                                    SHA512

                                    d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    e55832d7cd7e868a2c087c4c73678018

                                    SHA1

                                    ed7a2f6d6437e907218ffba9128802eaf414a0eb

                                    SHA256

                                    a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574

                                    SHA512

                                    897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\38e0e7b3-11fc-4e9c-972d-bba03948011e.tmp

                                    Filesize

                                    1B

                                    MD5

                                    5058f1af8388633f609cadb75a75dc9d

                                    SHA1

                                    3a52ce780950d4d969792a2559cd519d7ee8c727

                                    SHA256

                                    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                    SHA512

                                    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    ecfd468a7210c6ed15c3666f152caa87

                                    SHA1

                                    a30036f09897ff1d59e24db54950dc29cb5879a9

                                    SHA256

                                    cf39b5726791e8eac77a53a17236b559a9c6d600882f060c97e03e5939b7cf31

                                    SHA512

                                    cab5fdf71befeb74f086292ea928ea25b93b2e19172410e6036694b89367c4590639d544678cb127d02e78fa174facf74dd90c5f8b45ce592ad409427aa2c37d

                                  • C:\Users\Admin\AppData\Local\Temp\1005970001\chrome11.exe

                                    Filesize

                                    4.5MB

                                    MD5

                                    5b39766f490f17925defaee5de2f9861

                                    SHA1

                                    9c89f2951c255117eb3eebcd61dbecf019a4c186

                                    SHA256

                                    de615656d7f80b5e01bc6a604a780245ca0ccefd920a6e2f1439bf27c02b7b7a

                                    SHA512

                                    d216fa45c98e423f15c2b52f980fc1c439d365b9799e5063e6b09837b419d197ba68d52ea7facf469eae38e531f17bd19eaf25d170465dc41217ca6ab9eb30bf

                                  • C:\Users\Admin\AppData\Local\Temp\1006029001\l4.exe

                                    Filesize

                                    5.9MB

                                    MD5

                                    d68f79c459ee4ae03b76fa5ba151a41f

                                    SHA1

                                    bfa641085d59d58993ba98ac9ee376f898ee5f7b

                                    SHA256

                                    aa50c900e210abb6be7d2420d9d5ae34c66818e0491aabd141421d175211fed6

                                    SHA512

                                    bd4ef3e3708df81d53b2e9050447032e8dcdcc776cf0353077310f208a30dab8f31d6ec6769d47fb6c05c642bdd7a58fb4f93d9d28e2de0efc01312fbc5e391e

                                  • C:\Users\Admin\AppData\Local\Temp\1006032001\Qtdedcpuf.exe

                                    Filesize

                                    1.4MB

                                    MD5

                                    338cbbffa6028ee1a0beb3e7e6c4abd9

                                    SHA1

                                    bd008e415d2d85a124d33d455a2e2b0a0312be39

                                    SHA256

                                    1af9406ad522df70d8b59054cbdbef1a267fe199ab0ec1369523cdce9884bea6

                                    SHA512

                                    a8bb96d8ab47a3f57d5f1fc48c61392e9b28b379517cd12a468044d42a7ecdf9c099244d94784ff2411b358ea2272f8069a2fee2ea952b693ee460de0f689215

                                  • C:\Users\Admin\AppData\Local\Temp\1006092001\Ixpla.exe

                                    Filesize

                                    1.4MB

                                    MD5

                                    6e7ffd057086e44e4fcc01846cd2b152

                                    SHA1

                                    05712e7e7b8429b2dd201ea504dc32fefe5795da

                                    SHA256

                                    fbc587e990949e428e8ce7a2c74dbf85cd63ffa07370756ad854595fea0033d7

                                    SHA512

                                    8cab1824b32c54273658d28738109c8a1ef3170c1fbe02deeee40d40990acb6d45431bfb65a3facebee9a919bd972734012b1e8de035b9c1329f1bd0e709ecd2

                                  • C:\Users\Admin\AppData\Local\Temp\1006141001\networkmanager.exe

                                    Filesize

                                    2.1MB

                                    MD5

                                    f8d528a37993ed91d2496bab9fc734d3

                                    SHA1

                                    4b66b225298f776e21f566b758f3897d20b23cad

                                    SHA256

                                    bc8458a8d78cf91129c84b153aafe8319410aacb8e14aec506897c8e0793ba02

                                    SHA512

                                    75dc1bbb1388f68d121bab26fc7f6bf9dc1226417ad7ed4a7b9718999aa0f9c891fed0db3c9ea6d6ccb34288cc848dc44b20ea83a30afd4ea2e99cff51f30f5a

                                  • C:\Users\Admin\AppData\Local\Temp\1006190001\ee72178c01.exe

                                    Filesize

                                    1.7MB

                                    MD5

                                    6731bd7e893f440a5f73edfd40b73112

                                    SHA1

                                    8e396ca101830e0116881c8d8c81c6d5e7918afe

                                    SHA256

                                    599399619509681016345f5e4e50f6edd38a70496201d1a9fbfe5c53d7f4690b

                                    SHA512

                                    d0247ad0a1392a9b622d08e22feee7d79854c8f1492f0b4d5d5e669f7efce409e3a3961f8229ebb40aca97ed6e36066b40393b3e9cb78d7356d34d530c125110

                                  • C:\Users\Admin\AppData\Local\Temp\1006191001\1960939e42.exe

                                    Filesize

                                    2.7MB

                                    MD5

                                    9aa3e28acbd0b5a2e045a6d513c93b6b

                                    SHA1

                                    9381e49745b0e1c2fab053f8d4d2a59bc61988f1

                                    SHA256

                                    2f1568be0dd8f9a154b003441a09464578fc012d81f60faab98f8ba9c1913898

                                    SHA512

                                    994aacaaafb7a60400aa05ad2524eac325b50b46109a75a71e2907e0dc08b5147ad7f63d308c72b92dc70d232335134815b461b00c18c722a365e6e0f8491471

                                  • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    878ce67b39a161328729707ace72b131

                                    SHA1

                                    0022266e6b123fc7c0147d3085d75ec10ab10359

                                    SHA256

                                    954c129f2e83fc13a5064b626a6588f25badd76fdab71dff8218416dcfb14972

                                    SHA512

                                    a5357a3b150e197981baf1d4e837b62ef2714d38426b117382591b04a3930dd7826563faabf8cb7c777dd9f18ed26966a1dab51ded1a17ac7b9b73ff786ca95f

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\_socket.pyd

                                    Filesize

                                    81KB

                                    MD5

                                    69801d1a0809c52db984602ca2653541

                                    SHA1

                                    0f6e77086f049a7c12880829de051dcbe3d66764

                                    SHA256

                                    67aca001d36f2fce6d88dbf46863f60c0b291395b6777c22b642198f98184ba3

                                    SHA512

                                    5fce77dd567c046feb5a13baf55fdd8112798818d852dfecc752dac87680ce0b89edfbfbdab32404cf471b70453a33f33488d3104cd82f4e0b94290e83eae7bb

                                  • C:\Users\Admin\AppData\Local\Temp\ONEFIL~1\select.pyd

                                    Filesize

                                    30KB

                                    MD5

                                    7c14c7bc02e47d5c8158383cb7e14124

                                    SHA1

                                    5ee9e5968e7b5ce9e4c53a303dac9fc8faf98df3

                                    SHA256

                                    00bd8bb6dec8c291ec14c8ddfb2209d85f96db02c7a3c39903803384ff3a65e5

                                    SHA512

                                    af70cbdd882b923013cb47545633b1147ce45c547b8202d7555043cfa77c1deee8a51a2bc5f93db4e3b9cbf7818f625ca8e3b367bffc534e26d35f475351a77c

                                  • C:\Users\Admin\AppData\Local\Temp\Tmp3FE4.tmp

                                    Filesize

                                    2KB

                                    MD5

                                    ed8b4e9858a338e53babea9ff5ed37f9

                                    SHA1

                                    a458613b721fd99e6c2f607475c453512ce8f5d0

                                    SHA256

                                    823e209f674a7f191f59ff7efdbdd4b67eb01ddc49eb691ce806af7c0490949a

                                    SHA512

                                    e969ba5ed1079456bec3a46dbd0ff44df2c69bb0cdb6b702a0f67022b529123eadb99c9acff8f19a965b7a552a4c1fc9da79b9c295ede648c27f4dfba136956c

                                  • C:\Users\Admin\AppData\Local\Temp\Tmp4006.tmp

                                    Filesize

                                    2KB

                                    MD5

                                    7d8553a10ea027075edf91efc7ef5878

                                    SHA1

                                    af37f9dd2409a848730c8c19024c71850f3c47a2

                                    SHA256

                                    7810f022203ec8984d2e39b220d5f1f1d0267556434470399b9376a569438dcb

                                    SHA512

                                    86ba2634e4c48ebf7e0f61d7ccab690313fd93c6510b48692aaf2394d9ae58524758e2f3813b8279bd8065ba989d6e47f936c182605ca615d4be8351e9072b3a

                                  • C:\Users\Admin\AppData\Local\Temp\Tmp41AE.tmp

                                    Filesize

                                    2KB

                                    MD5

                                    41654f870fe3816c67ef87546a5005e8

                                    SHA1

                                    42ef0b1719da5845704e2272c0503054f2785837

                                    SHA256

                                    d8dad2bc0128b3855708a916421f325542877378b19856cd79ab2acefbab6f2f

                                    SHA512

                                    91867a691edfdd7411a9efe7bc76bdb940feefdd26984888269fbf2236c8e8800b9709f51fa4840ab2dc0e43dd281d21892a3b4c1896f8652dc2f32626eaff20

                                  • C:\Users\Admin\AppData\Local\Temp\Tmp4559.tmp

                                    Filesize

                                    2KB

                                    MD5

                                    c0a3c33eb1c611e21fcc70c34c2c3194

                                    SHA1

                                    ec2eb939534ad743ae1406f571e5d29435513227

                                    SHA256

                                    670b738563383102b7ba5c1f97cc4491d1a5b9c95e3902bf79bb434b28bf5276

                                    SHA512

                                    30196250c3ab68ad054af2b14bbe6b910d5c8e2f35398cd1cc26420b8aa9859d5aa6ba8945e827b92593ad91a1bc73622424726ac706c89cd09e11867d9694b4

                                  • C:\Users\Admin\AppData\Local\Temp\Tmp4868.tmp

                                    Filesize

                                    2KB

                                    MD5

                                    370ffd75086b4bd1d32f75c9df326c40

                                    SHA1

                                    a72c3e2be09b3c3d5add56fd433794469cd3f1ce

                                    SHA256

                                    297645d78bc3c3eff96a6eb386a11bc19ef108ce44e8b5e3853381c12c587740

                                    SHA512

                                    22568e9f5ba285a933ce65632d993ca0df8b0e7831aa205dc160c5a3edfbed05a69d1377dd3ab9c9bcabfeb06ca743a7c1313a851146183e263edd6adfd2668c

                                  • C:\Users\Admin\AppData\Local\Temp\TmpEEA6.tmp

                                    Filesize

                                    2KB

                                    MD5

                                    2735d39e003932f7707af7d3c83e9f42

                                    SHA1

                                    d791129d59023accd52bca52afcb49be8ae92942

                                    SHA256

                                    d453c4885716e6d4507d4921a84459af189d2f7d12e6cbb136bd5b0ad7c8afbf

                                    SHA512

                                    2f6974374b2f9ab736a3268724b2675e9cbee70c6f3966d9828662456ee13533c7cf9f5410d6a11eb15361063154415a7c9249ab5a801fb7125c482b284ffba1

                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                    Filesize

                                    3.1MB

                                    MD5

                                    539341782f4a87527e7fa92a400d7f22

                                    SHA1

                                    e42c8be2c48096fb20972e4798b479e107750289

                                    SHA256

                                    4be2c4d5712a87cd800b8d7a8eebc0bc57e473bd83c83c7ea71d1954a4ab5849

                                    SHA512

                                    5df8530c8357b092dbf2fb519473ea7479cd12eb90798dfeb9a7c2b40529906537c538c986ef16c62bda4614e7d1493670f872d6c648b65cff2698a07d1dc6bb

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1064_133784697957361303\VCRUNTIME140.dll

                                    Filesize

                                    116KB

                                    MD5

                                    be8dbe2dc77ebe7f88f910c61aec691a

                                    SHA1

                                    a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                    SHA256

                                    4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                    SHA512

                                    0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1064_133784697957361303\_bz2.pyd

                                    Filesize

                                    83KB

                                    MD5

                                    30f396f8411274f15ac85b14b7b3cd3d

                                    SHA1

                                    d3921f39e193d89aa93c2677cbfb47bc1ede949c

                                    SHA256

                                    cb15d6cc7268d3a0bd17d9d9cec330a7c1768b1c911553045c73bc6920de987f

                                    SHA512

                                    7d997ef18e2cbc5bca20a4730129f69a6d19abdda0261b06ad28ad8a2bddcdecb12e126df9969539216f4f51467c0fe954e4776d842e7b373fe93a8246a5ca3f

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1064_133784697957361303\_lzma.pyd

                                    Filesize

                                    156KB

                                    MD5

                                    9e94fac072a14ca9ed3f20292169e5b2

                                    SHA1

                                    1eeac19715ea32a65641d82a380b9fa624e3cf0d

                                    SHA256

                                    a46189c5bd0302029847fed934f481835cb8d06470ea3d6b97ada7d325218a9f

                                    SHA512

                                    b7b3d0f737dd3b88794f75a8a6614c6fb6b1a64398c6330a52a2680caf7e558038470f6f3fc024ce691f6f51a852c05f7f431ac2687f4525683ff09132a0decb

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1064_133784697957361303\l4.exe

                                    Filesize

                                    5.9MB

                                    MD5

                                    63c4e3f9c7383d039ab4af449372c17f

                                    SHA1

                                    f52ff760a098a006c41269ff73abb633b811f18e

                                    SHA256

                                    151524f6c1d1aeac530cfd69de15c3336043dc8eb3f5aeaa31513e24bfd7acdd

                                    SHA512

                                    dcfb4804c5569ad13e752270d13320f8769601b7092544741e35bc62a22af363b7a5ea7c5a65132c9575540a3e689a6946110502bd0f046385b8739e81761fbf

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_1064_133784697957361303\python312.dll

                                    Filesize

                                    6.6MB

                                    MD5

                                    166cc2f997cba5fc011820e6b46e8ea7

                                    SHA1

                                    d6179213afea084f02566ea190202c752286ca1f

                                    SHA256

                                    c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

                                    SHA512

                                    49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

                                  • C:\Users\Admin\AppData\Local\Temp\rootCert.pfx

                                    Filesize

                                    2KB

                                    MD5

                                    1c7f52e8a9079035004b7e31d5fa0075

                                    SHA1

                                    def8c1b6bb0961a7a32d85a8071ba3a632214b40

                                    SHA256

                                    9bf2c733f243f2913186f02e3b2a4daad8f63fdd7057d1facd8e6f4699217690

                                    SHA512

                                    938df6ad9ee6ca3358bc4bcad0fb4879ed43182f8ee57325f058059a3504bae6621cbbba4e5202d9164ad0bad09866f6e04d708f8338f5658e28102644232cec

                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir2988_65270175\CRX_INSTALL\_locales\en_CA\messages.json

                                    Filesize

                                    711B

                                    MD5

                                    558659936250e03cc14b60ebf648aa09

                                    SHA1

                                    32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                    SHA256

                                    2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                    SHA512

                                    1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                  • C:\Users\Admin\AppData\Local\Temp\scoped_dir2988_65270175\b014b098-7053-4341-bd35-81cbbc043f46.tmp

                                    Filesize

                                    135KB

                                    MD5

                                    3f6f93c3dccd4a91c4eb25c7f6feb1c1

                                    SHA1

                                    9b73f46adfa1f4464929b408407e73d4535c6827

                                    SHA256

                                    19f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e

                                    SHA512

                                    d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4

                                  • C:\Users\Admin\AppData\Local\Temp\tmpEEE6.tmp

                                    Filesize

                                    2KB

                                    MD5

                                    edae189c4ca8a448432d69e886f3511b

                                    SHA1

                                    d8b3359c0016041f58bbb89b219a32ae01620447

                                    SHA256

                                    f3e6fb3459b6ce508366ece867f61a4b4a9787166ae48a100d24896dd7681c8b

                                    SHA512

                                    ad0cc29e00485e4f68f6c74ea3bb432fd9efa239d77fcea8fb99f812b26f313bb8de1eb070ebca4e72aa5ee74e9204a8f8f5a022ba0d4287865b094a457a8bf9

                                  • C:\Users\Admin\AppData\Local\Temp\unique_laptops.txt

                                    Filesize

                                    28B

                                    MD5

                                    6cace4523b8f5515006ce05d02199ec7

                                    SHA1

                                    40d67d134f912180aabef5843221a895a9f9c622

                                    SHA256

                                    8cf6bd05bafe86b9b826a02a0f8694231f26779b819297c120659b073519a85e

                                    SHA512

                                    1c068b0ab456ce6e49dc4da3b9b00b3ab7c7505ad34af35cfe175d2e830cb0342555846a318c1ae2157cde61f2150b6b4d975ab36bf8445026892168eaf45ee6

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-940901362-3608833189-1915618603-1000\84ef8e32cf3dd22e15e36759d999f0aa_f2cdb6fb-4ab8-4547-9f25-fad1f7a44351

                                    Filesize

                                    2KB

                                    MD5

                                    37d140db6c7baf56ef37156f8969cf6c

                                    SHA1

                                    95a02ab71ed3a515fe6802a12df93d9af042a082

                                    SHA256

                                    cfecc78b5554e835e29f721fee6decacdc7bfe851bd859fbd40f03330d39daaf

                                    SHA512

                                    b217383e38d1bb69133ab9bb43bfc5f6391c6fd0f99b84d8d44d1ff78083e1d8981b6b6aff7bc512f556b713776e86607b5c6b70a4bea7301444f6c0554946ac

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\5AD8249B955C711D9E81555B1218A70688822623

                                    Filesize

                                    1KB

                                    MD5

                                    1b42e5f97968886018d264c0d1e77291

                                    SHA1

                                    8862a909ebe18b0901939813f91013239d914bcd

                                    SHA256

                                    15f16797c9bd6ba77477efa764bea2913b2fa7c6c3ac8db3fcf39d04879dc263

                                    SHA512

                                    40ccdf402cfc66c2de0e4446efba20aaf49a67fabc5f164cafed87612b497cb9f0eed1ae8e348cb297a2a5b944c783abcd1eb5d33f9ff3bc9cd5ed26a4825b0e

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\5AD8249B955C711D9E81555B1218A70688822623

                                    Filesize

                                    1KB

                                    MD5

                                    42717eeb03221c4fb3b9c4aeb6ce44da

                                    SHA1

                                    fc764a690efc912390d74468ab14c28782e92453

                                    SHA256

                                    73040942fac4f8f8a7107f3f00e6eca75a32430ca8e9dc366d987861e8ddbfc8

                                    SHA512

                                    c50295f49a6958894bfde3ba68ae71dcf83fcdb7e2788c96be7fa1d2965fcf26b3a095fb88d1dc0838ee71fac764f3949af3f83cafb48b80425bbf005e9a92f2

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\2D73232E8F0268966EB84FB6B92D8EEA0510D850

                                    Filesize

                                    248B

                                    MD5

                                    bce83c11bb947214deed8395a43e84df

                                    SHA1

                                    c8042e55198890425e86fd02f7fb8b494b59c83e

                                    SHA256

                                    8ccf3c5f7f4cf04e5bb66edb80a9040a103e8298f919567b2eaa52385d3b57f7

                                    SHA512

                                    6ee63ca3d00a1d144376d1b3bf545c5440a5811b179998504a2faddf626119a19c21438b6f919d5a2755258e94fba4a86f9358e3d919d969b19afb8e70214dfe

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lbroker.vbs

                                    Filesize

                                    82B

                                    MD5

                                    107a610c004bfc1ebb8b87365b2c4600

                                    SHA1

                                    04695e838daaaf45d91f0b51868c8995b80d3392

                                    SHA256

                                    3a5be027d623c694cc4874fbb6cd2f434bbaf65033607f6d2acfc1d05c3f6fdc

                                    SHA512

                                    4b26a04ec889e149bf4fb974178990804d371d72b239c1d55c5acc32636cfd7ad02f8d21ed9e289358873242493303de25f2a0bca7d1b5da9b0426854ff4a2d2

                                  • memory/1148-152-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/1148-20-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/1148-91-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/1148-90-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/1148-134-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/1148-21-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/1148-146-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/1148-16-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/1148-403-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/1148-19-0x0000000000F21000-0x0000000000F4F000-memory.dmp

                                    Filesize

                                    184KB

                                  • memory/1420-2614-0x0000000000B10000-0x0000000000DC8000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/1420-3203-0x0000000000B10000-0x0000000000DC8000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/1420-3229-0x0000000000B10000-0x0000000000DC8000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/1420-2613-0x0000000000B10000-0x0000000000DC8000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/1420-2597-0x0000000000B10000-0x0000000000DC8000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/2156-2708-0x0000000000200000-0x000000000097B000-memory.dmp

                                    Filesize

                                    7.5MB

                                  • memory/2156-2554-0x0000000000200000-0x000000000097B000-memory.dmp

                                    Filesize

                                    7.5MB

                                  • memory/2972-18-0x0000000000B90000-0x000000000105A000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/2972-0-0x0000000000B90000-0x000000000105A000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/2972-5-0x0000000000B90000-0x000000000105A000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/2972-3-0x0000000000B90000-0x000000000105A000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/2972-2-0x0000000000B91000-0x0000000000BBF000-memory.dmp

                                    Filesize

                                    184KB

                                  • memory/2972-1-0x00000000774D4000-0x00000000774D6000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/3056-223-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-3245-0x0000000005DA0000-0x0000000006344000-memory.dmp

                                    Filesize

                                    5.6MB

                                  • memory/3056-161-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-207-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-199-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-2027-0x0000000005470000-0x00000000054BC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/3056-217-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-2018-0x00000000053E0000-0x000000000546A000-memory.dmp

                                    Filesize

                                    552KB

                                  • memory/3056-185-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-197-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-219-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-3246-0x0000000005510000-0x0000000005564000-memory.dmp

                                    Filesize

                                    336KB

                                  • memory/3056-221-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-160-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-163-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-165-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-215-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-225-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-201-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-205-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-203-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-157-0x00000000051C0000-0x00000000052D8000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-156-0x00000000006C0000-0x000000000082A000-memory.dmp

                                    Filesize

                                    1.4MB

                                  • memory/3056-167-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-169-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-172-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-173-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-175-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-177-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-158-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-195-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-193-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-179-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-181-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-191-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-183-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-189-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3056-187-0x00000000051C0000-0x00000000052D2000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/3268-40-0x00007FFD8C983000-0x00007FFD8C985000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/3268-41-0x000001C221CD0000-0x000001C222160000-memory.dmp

                                    Filesize

                                    4.6MB

                                  • memory/3268-43-0x000001C23CB00000-0x000001C23CCC2000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/3716-2578-0x0000000000250000-0x00000000008E0000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/3716-3169-0x0000000000250000-0x00000000008E0000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/3716-4491-0x0000000000250000-0x00000000008E0000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/4292-890-0x0000000005310000-0x0000000005428000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/4292-2555-0x0000000005660000-0x00000000056EA000-memory.dmp

                                    Filesize

                                    552KB

                                  • memory/4292-758-0x0000000000A60000-0x0000000000BCA000-memory.dmp

                                    Filesize

                                    1.4MB

                                  • memory/4616-4505-0x0000000000A60000-0x0000000000D81000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/4616-4509-0x0000000000A60000-0x0000000000D81000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/5384-4532-0x0000000000A60000-0x0000000000D81000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/5384-4537-0x0000000000A60000-0x0000000000D81000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/5668-4533-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/5668-4535-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/5936-4489-0x0000000000850000-0x0000000000B71000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/5936-4504-0x0000000000850000-0x0000000000B71000-memory.dmp

                                    Filesize

                                    3.1MB

                                  • memory/6124-3204-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/6124-3218-0x0000000000F20000-0x00000000013EA000-memory.dmp

                                    Filesize

                                    4.8MB