Resubmissions

25/03/2025, 04:35

250325-e717gsvkx9 10

25/03/2025, 03:46

250325-ebx5ysz1b1 8

25/03/2025, 03:44

250325-eafvaazzh1 6

25/03/2025, 03:40

250325-d8ngcatps8 6

25/03/2025, 03:37

250325-d6g7jstnz8 6

25/03/2025, 03:34

250325-d44b1azzdx 8

25/03/2025, 03:29

250325-d2dzbstnv8 8

25/03/2025, 02:53

250325-ddd97atkw6 10

25/03/2025, 02:47

250325-dadjgstkt3 10

25/03/2025, 02:44

250325-c8f7lazwaw 10

Analysis

  • max time kernel
    163s
  • max time network
    164s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250314-en
  • resource tags

    arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/03/2025, 03:40

Errors

Reason
Machine shutdown

General

  • Target

    http://Google.com

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://Google.com
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbc8cdcf8,0x7fffbc8cdd04,0x7fffbc8cdd10
      2⤵
        PID:3656
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1956,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=1952 /prefetch:2
        2⤵
          PID:5912
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1432,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2224 /prefetch:11
          2⤵
            PID:3344
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2348,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2548 /prefetch:13
            2⤵
              PID:4260
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3212 /prefetch:1
              2⤵
                PID:2516
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3232 /prefetch:1
                2⤵
                  PID:4508
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4180,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4208 /prefetch:9
                  2⤵
                    PID:5020
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4628,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4644 /prefetch:1
                    2⤵
                      PID:1104
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5068,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5136 /prefetch:14
                      2⤵
                        PID:2060
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=212,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5324 /prefetch:14
                        2⤵
                          PID:596
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5428,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5432 /prefetch:14
                          2⤵
                            PID:1488
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5436,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5256 /prefetch:14
                            2⤵
                              PID:4356
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5420,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5164 /prefetch:1
                              2⤵
                                PID:3288
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3780,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5668 /prefetch:14
                                2⤵
                                • NTFS ADS
                                PID:3108
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5752,i,6715508700112061810,1395198894097407106,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5424 /prefetch:10
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4472
                            • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                              1⤵
                                PID:4216
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                1⤵
                                  PID:4616
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:4960
                                  • C:\Users\Admin\Downloads\BromineTrojan-main\BromineTrojan-main\Bromine.exe
                                    "C:\Users\Admin\Downloads\BromineTrojan-main\BromineTrojan-main\Bromine.exe"
                                    1⤵
                                    • Writes to the Master Boot Record (MBR)
                                    • System Location Discovery: System Language Discovery
                                    PID:432
                                  • C:\Windows\system32\AUDIODG.EXE
                                    C:\Windows\system32\AUDIODG.EXE 0x00000000000004CC 0x00000000000004D8
                                    1⤵
                                      PID:2376
                                    • C:\Windows\system32\LogonUI.exe
                                      "LogonUI.exe" /flags:0x4 /state0:0xa3a2e855 /state1:0x41c64e6d
                                      1⤵
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2208

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                      Filesize

                                      649B

                                      MD5

                                      edf0377de57a88c0dc510c8f46c6344f

                                      SHA1

                                      a745040eaa3eabc83d19a109b09bd4508558c387

                                      SHA256

                                      f346ab8fe296fce87163828208fbafc4c4b48604ef53eb8d4c0fb5817c95d272

                                      SHA512

                                      3737fd7cb918ab6bac0261adbd1f834033daeec6e372969ec3aef804e3899629e5ea7f08035bb20c8a7e8a52e1ca983996cd0085bfff0df4676cae284298d2cb

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\temp-index

                                      Filesize

                                      720B

                                      MD5

                                      748d26335b6178dc674c163f0fbe120d

                                      SHA1

                                      b15d82b31afd72456bebe0440ba41e5c31d05b23

                                      SHA256

                                      1228d6b8fcd3668f3051ae1a07d12bf7671f5ede96a61b52c7e206caf76f43ee

                                      SHA512

                                      5e3c5eb62da58cf3cddf173b29820d28ec9557b0bfeca7aaa4a62dee9aa7d452fa9f261b882f54052b56ba1eaba5329ef2d158e5a7170a053d203bd2c813ba94

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      2KB

                                      MD5

                                      39e22895b7adcc626ee7b91b60cdc783

                                      SHA1

                                      5c872d17d3e54f97dd94ebb857dfb95b72edb6f7

                                      SHA256

                                      3140e878e4f802f8a094946985faa47c43aad324273705307bbc34a673915f7f

                                      SHA512

                                      727d22c5ce448bea3e74bdc0ab814f2e7566c1ea8d6177bf452f130e7539f323a2f3d92b29a06f2e63e3ba81117804040ee786d1a0d8121b9676a591611a5e51

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      6KB

                                      MD5

                                      81c85ba5243060f91a3e2e4b721cdc64

                                      SHA1

                                      1beba4376236b734d012b113d89ef5c37c38b2eb

                                      SHA256

                                      dc0512447dea410a0d0a90f8b17604d0d5d86708f5b4d21fa110dd2fb9f3a023

                                      SHA512

                                      27b8d2e659aebd18094dfb23174218fc9129096124742f88390c8890d8d917f67e8fc38bc39b33db0e8296ddd0c507ffb468461e7083c62225e3018b7217a19e

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                      Filesize

                                      5KB

                                      MD5

                                      f027ab7b900cc786f981fdf25730158d

                                      SHA1

                                      ef1f9a4995b96421baddd1bbef4783718f1700fe

                                      SHA256

                                      f052978bd31aa36c5a38630da055a3e8013eff130aeded613039abc5b979ce40

                                      SHA512

                                      d03fe6bca33c85aad08cb8084a0f77994fba0707e5fe8a5fe5db5ac2c12945e2bb2f25c1e5ed412febc5e38614da9aed98c003670b066f2754947cadea9785d1

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                      Filesize

                                      2B

                                      MD5

                                      d751713988987e9331980363e24189ce

                                      SHA1

                                      97d170e1550eee4afc0af065b78cda302a97674c

                                      SHA256

                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                      SHA512

                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      1KB

                                      MD5

                                      221321601e9880a8d72aff008908b1bc

                                      SHA1

                                      c4d4028b89a1bb37751dab40436c2659737aec42

                                      SHA256

                                      9acf62ec3b0edd3e17792c1b294bfd558c86b12489bf075e8b2bbca67a13b48e

                                      SHA512

                                      e6f0adb09f1f68656f439c0f0f5a2f9f6512182fa6c5d2e607012637ac7c5e814aa76977f2dc614b0b74100ebb424e3fec8eee1f4c43172cd67c7be659508887

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      12KB

                                      MD5

                                      9692187540af17ff2ad4f321c78733de

                                      SHA1

                                      597c05960852a1e6b386980434ac1d1ea5649919

                                      SHA256

                                      f41e5d109eb4131a6793176690e34b3a0a9318f3faafe188789376b419c3d2b9

                                      SHA512

                                      23316ba91af90dde0779d44b72f5d556ca489d28501b4efb581834489985fb7a4f3f747cda74f613e00c5719d3ce72a52ce0e9296be54e48f720d13ba89175f9

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      11KB

                                      MD5

                                      b6b0c452d9b04be30ed2284095346405

                                      SHA1

                                      5fd270bb57c3dea5d85f85676b0c168aa1549e98

                                      SHA256

                                      d1514a1918c16f22682926ffa49b43b4a2c9345b9588877e4014da52d8e48b73

                                      SHA512

                                      7b34acffa88f7b2b80368911e4a1796104f290caf22d4b4e830583aded38da20ff16f7483fca61e5497278b11ddfd7df7d3052723af27806451bf4686735dfde

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      11KB

                                      MD5

                                      8df732d23cba7b4cf29d7b6ca16e4afe

                                      SHA1

                                      1ca17bcd641d3e5646a836e12f614e994a0bb236

                                      SHA256

                                      971148094458e3f586d0066a03a37ee2ff8b997f904df32fc1fe5b76e4cf9319

                                      SHA512

                                      74d38b92c910095504278156c85862852753916782f4cf7550b3ccf595d01a90ff0f183c07a31f3b52a95b40ac029e9765b36810b17402f62df64cd519cc2731

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      11KB

                                      MD5

                                      7fac982955d90a52e7ff0d53bb0c3792

                                      SHA1

                                      b54fa05ef30e0bc5f547f4120d114161c2a3d954

                                      SHA256

                                      fe98ff6ec95571c7c269ac1470c9c2a1dc1f063ad60250d59b8990ef2087f7d7

                                      SHA512

                                      2366901b1b0c71fa07c4068f5a24abdbd0150f1bee61d53efb7def61d4e9362e797ee2cd6c12add7fcb39505a81afca5b81826cccd3245759805485c83f56a45

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      10KB

                                      MD5

                                      1bf593deb380608a5b2e9d7342e78314

                                      SHA1

                                      bdd332d927cb476e1138e2f1175d6f4284dccbbd

                                      SHA256

                                      31a440e1b2cdc48b60c5b0ff2b7de3cb1565e77e4a6056abb468f0cca04dda65

                                      SHA512

                                      5b7c246afa2fdbb60f99274b450c285a2cacea04ba11f439e07174f947e45f1178b842432ddbdc6e1a2aec39aeaeb2daad101b84f3cccf5484f4ad6e29bc92cf

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                      Filesize

                                      15KB

                                      MD5

                                      0c4ee74392bcb9c2651fb89da5d6ea38

                                      SHA1

                                      3b0c059f0763113bc1f02ff5dcbc7ab421b9bb30

                                      SHA256

                                      271186f51c93e49b8e397d63570f77ed64355ad873c825457f56c4be696da869

                                      SHA512

                                      0c69717b1882b08f112a904faf5b582497a6ba83dceeb00e15c8522c1557dc55e25ee27713984c27e49a24c9d84606c6cb4edd41168ee16587e07a3402257080

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                      Filesize

                                      72B

                                      MD5

                                      69bda1a8eeb23213d27ad4f288f9b3fe

                                      SHA1

                                      05c92a29015d311d0bb809558a44b0a2e476cde0

                                      SHA256

                                      d2cd55647c902c7048b9894d249c0a48cfc51242542a8de3a8d622a55d7a5234

                                      SHA512

                                      e59496556e10ade6c07d8b7090595268f06a3964af0cf1ee7cc2519a2dcfdd6c733ef720a1e42e5e8e89b91dfcace228d1943309a049f5a08b8e021d956dc5d1

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e5bc.TMP

                                      Filesize

                                      48B

                                      MD5

                                      2c0d8636f84b81397bb9faf2db2640a4

                                      SHA1

                                      c5e4e096ee3ab0c62ead122b2299577c1f097a5b

                                      SHA256

                                      3287499acd0860bac6dffbf0b1f7a55e5a6a9a2b579fc0652352aaa9c4811a2e

                                      SHA512

                                      f22071eabf181290d60f2b4b40edb26187305164d8c6c2e07b7ea05830be11c8cf227a5849b06f18cda455d654ea706b933a8fcc49be5bcc125e2dc323d24cda

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      81KB

                                      MD5

                                      f392e6d50a1c7866c31508602f775f53

                                      SHA1

                                      dd99f04a5dc7eda5e781bfff82c32692f033f645

                                      SHA256

                                      f00a2a8c0729d127b4aee11cc73755575cb89c0226f7e167532ad8e8fe6fb610

                                      SHA512

                                      1ec269661e23293d83e1e97f76cd7d59ee413e5e76cb2deb7a97c42c4083beae3264438f4881ffa4e37228adf0bfcb8453e3ba99893262f50927b4a830c1fa90

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\e0d99d6b-02b8-4868-8ce7-e9fd38dc9632.tmp

                                      Filesize

                                      80KB

                                      MD5

                                      7e02bdc83dcd45a0bdd3d54a3309566e

                                      SHA1

                                      2974b2fcb0122f72fc0de73f41dde28d6f52533a

                                      SHA256

                                      9bc41809ac9687f816e1fbefef1f2fc84d73c80af27430508e6afc95ff18a97e

                                      SHA512

                                      be827a80094110ca344fcac55ab4355ed0fe8c03d7f865652c2fbb6085649861373a68e0a5fa0520143df176176939155408ee804ee693188452f76e3f8d620f

                                    • C:\Users\Admin\Downloads\BromineTrojan-main.zip.crdownload

                                      Filesize

                                      2.4MB

                                      MD5

                                      8b0bc436cce3ca47dbfd3ed067ee16fd

                                      SHA1

                                      fcf110792f5095d16b34ff1cb3ad70981ca4ed25

                                      SHA256

                                      5be4d59fe82a0c086520c44adfb1e07dbe186a229373833bd382ab251a4294aa

                                      SHA512

                                      dc33b7ff7c9b3fde7e29a8079dfb949f7d2a2ee32c865ae36e499e159fac1bbe62fc7cd91c9daba154bc8a25695ded2098d91cd132dc4437e3ed0504c41f5d50

                                    • C:\Users\Admin\Downloads\BromineTrojan-main.zip:Zone.Identifier

                                      Filesize

                                      26B

                                      MD5

                                      fbccf14d504b7b2dbcb5a5bda75bd93b

                                      SHA1

                                      d59fc84cdd5217c6cf74785703655f78da6b582b

                                      SHA256

                                      eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                      SHA512

                                      aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                    • memory/432-535-0x0000000000400000-0x000000000040C000-memory.dmp

                                      Filesize

                                      48KB