[2026-01-08T16:54:04.661084] DB: Submission created
[2026-01-08T16:54:08.357119] Connected to agent at http://10.10.20.100:8080 on attempt 1
[2026-01-08T16:54:10.367877] Successfully acquired lock on attempt 1
[2026-01-08T16:54:10.400538] RedEdr: Start trace for process: hnOp_loader_6_shellcode_1
[2026-01-08T16:54:13.405143] Executing file hnOp_loader_6_shellcode_1.exe on DetonatorAgent at 10.10.20.100
[2026-01-08T16:54:13.406625] Executing with for 12s and path C:\Users\Public\Downloads\
[2026-01-08T16:54:20.865044] Success executing file hnOp_loader_6_shellcode_1.exe
[2026-01-08T16:54:20.866313] Waiting, runtime of 12 seconds...
[2026-01-08T16:54:20.867688] Starting local EDR data gatherer
[2026-01-08T16:54:20.869986] Starting EDR Cloud plugin: CloudMdePlugin
[2026-01-08T16:54:32.875665] Runtime completed
[2026-01-08T16:54:43.443651] Process successfully killed
[2026-01-08T16:54:43.451857] Successfully released lock
[2026-01-08T16:54:43.453027] All information gathered from Agents, processing logs...
[2026-01-08T16:56:14.154304] VM successfully reverted
[2026-01-08T16:56:17.238220] VM successfully started
[2026-01-08 16:54:12.997 UTC] information: Exec: Execute request received for file: hnOp_loader_6_shellcode_1.exe
[2026-01-08 16:54:12.997 UTC] information: Exec: Using execution type: autoit
[2026-01-08 16:54:13.002 UTC] information: Defender Plugin: Started Windows Defender EDR log collection at 2026-01-08T16:54:13.002
[2026-01-08 16:54:13.002 UTC] information: Exec: Writing file: C:\Users\Public\Downloads\hnOp_loader_6_shellcode_1.exe
[2026-01-08 16:54:13.002 UTC] information: Writing malware to: C:\Users\Public\Downloads\hnOp_loader_6_shellcode_1.exe, xorkey: 221
[2026-01-08 16:54:13.019 UTC] information: Successfully wrote malware to: C:\Users\Public\Downloads\hnOp_loader_6_shellcode_1.exe
[2026-01-08 16:54:13.026 UTC] information: Executing malware using AutoIt Explorer: C:\Users\Public\Downloads\hnOp_loader_6_shellcode_1.exe with args:
[2026-01-08 16:54:13.028 UTC] information: Opening explorer.exe to execute file: C:\Users\Public\Downloads\hnOp_loader_6_shellcode_1.exe
[2026-01-08 16:54:13.040 UTC] information: Explorer opened with PID: 5748
[2026-01-08 16:54:19.322 UTC] information: Stored Explorer window title for cleanup: Downloads (from path: C:\Users\Public\Downloads)
[2026-01-08 16:54:19.322 UTC] information: Sending Enter key to open file: hnOp_loader_6_shellcode_1.exe
[2026-01-08 16:54:20.354 UTC] information: Found started process hnOp_loader_6_shellcode_1 with PID: 4888
[2026-01-08 16:54:20.354 UTC] information: Process started successfully using AutoIt Explorer with PID: 4888
[2026-01-08 16:54:20.409 UTC] information: Exec: Malware executed successfully with PID: 4888
[2026-01-08 16:54:20.420 UTC] information: Process 4888 completed (AutoIt Explorer)
[2026-01-08 16:54:20.479 UTC] information: Defender Plugin: Querying Windows Defender events from 2026-01-08T16:54:13.000000000Z to 2026-01-08T16:54:20.479879000Z
[2026-01-08 16:54:20.556 UTC] information: Defender Plugin: Retrieved 0 Windows Defender events
[2026-01-08 16:54:20.644 UTC] information: Defender Plugin: Successfully parsed 0 alerts
[2026-01-08 16:54:30.652 UTC] information: Defender Plugin: Querying Windows Defender events from 2026-01-08T16:54:13.000000000Z to 2026-01-08T16:54:30.652494000Z
[2026-01-08 16:54:30.698 UTC] information: Defender Plugin: Retrieved 7 Windows Defender events
[2026-01-08 16:54:30.708 UTC] information: Defender Plugin: Successfully parsed 6 alerts
[2026-01-08 16:54:40.718 UTC] information: Defender Plugin: Querying Windows Defender events from 2026-01-08T16:54:13.000000000Z to 2026-01-08T16:54:40.718479000Z
[2026-01-08 16:54:40.763 UTC] information: Defender Plugin: Retrieved 9 Windows Defender events
[2026-01-08 16:54:40.764 UTC] information: Defender Plugin: Successfully parsed 8 alerts
[2026-01-08 16:54:42.473 UTC] information: Exec: Kill request received
[2026-01-08 16:54:42.473 UTC] information: Defender Plugin: Stopping Windows Defender EDR log collection at 2026-01-08T16:54:42.473
[2026-01-08 16:54:42.475 UTC] information: Attempting to kill process with PID using AutoIt: 4888
[2026-01-08 16:54:42.477 UTC] information: Successfully killed process with PID using AutoIt: 4888
[2026-01-08 16:54:42.997 UTC] information: Attempting to close Explorer window with title: Downloads
[2026-01-08 16:54:42.997 UTC] information: Explorer window with title 'Downloads' not found - may have already been closed
[2026-01-08 16:54:43.002 UTC] information: LogsController: Retrieving agent logs
stdout:
stderr:
[
"2026-01-08 17:46:33.359 - RedEdr 0.5.5",
"2026-01-08 17:46:33.360 - Config: tracing malware",
"2026-01-08 17:46:33.361 - Permissions: Enabled PRIVILEGED & DEBUG",
"2026-01-08 17:46:33.361 - Manager: Starting all subsystems...",
"2026-01-08 17:46:35.936 - ETW: Microsoft-Windows-Kernel-Process (1, 2, 3, 4, 5, 6, 11)",
"2026-01-08 17:46:36.670 - ETW: Microsoft-Windows-Kernel-Audit-API-Calls (3, 4, 5, 6)",
"2026-01-08 17:46:37.153 - ETW: Microsoft-Windows-Kernel-File (10, 30)",
"2026-01-08 17:46:37.610 - ETW: Microsoft-Windows-Kernel-Network (12, 15, 28, 31, 42, 43, 58, 59)",
"2026-01-08 17:46:37.610 - ETW: All providers configured, ready to start collecting",
"2026-01-08 17:46:37.610 - !ETW: Started Thread (handle 00000000000001FC)",
"2026-01-08 17:46:37.611 - Manager: Populating process cache with all running processes",
"2026-01-08 17:46:37.611 - ProcessResolver: Starting to populate cache with all running processes",
"2026-01-08 17:46:37.630 - ProcessResolver: Successfully populated cache with 120 processes",
"2026-01-08 17:46:37.630 - ProcessResolver: Total cached processes: 120",
"2026-01-08 17:46:37.630 - ProcessResolver: Started cleanup thread with 30 minute interval",
"2026-01-08 17:46:37.630 - Manager: All subsystems started",
"2026-01-08 17:46:37.631 - !EventProcessor: Started Thread (handle 000000000000039C)",
"2026-01-08 17:46:37.631 - !Web: Started Thread (handle 0000000000000388)",
"2026-01-08 17:46:37.631 - Track Thread 0 (handle 0x00000000000001FC)",
"2026-01-08 17:46:37.631 - WEB: Web Server listening on http://0.0.0.0:8081",
"2026-01-08 17:46:37.631 - Track Thread 1 (handle 0x000000000000039C)",
"2026-01-08 17:46:37.631 - Track Thread 2 (handle 0x0000000000000388)",
"2026-01-08 17:46:37.632 - RedEdr: All started, waiting for 3 threads to exit",
"2026-01-08 17:54:09.959 - Trace targets: 1 targets",
"2026-01-08 17:54:09.959 - - hnOp_loader_6_shellcode_1",
"2026-01-08 17:54:09.959 - ProcessResolver: Re-evaluating all cached processes with current target names",
"2026-01-08 17:54:13.113 - Process: observe pid 5748: explorer.exe /select,\"C:\\Users\\Public\\Downloads\\hnOp_loader_6_shellcode_1.exe\"",
"2026-01-08 17:54:19.830 - Process: observe pid 4888: \"C:\\Users\\Public\\Downloads\\hnOp_loader_6_shellcode_1.exe\" "
]