Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-12-2024 11:25

General

  • Target

    5ee8d6dd653a71ef50c69e1007678e4ac6a3d0b5ea44b90d8aa01979d9bc8624.exe

  • Size

    5.1MB

  • MD5

    988f12717ae1d48f32472ac51c995bae

  • SHA1

    a0f9c75d4d93edacdb54aaf8e6e9b2feec33eb41

  • SHA256

    5ee8d6dd653a71ef50c69e1007678e4ac6a3d0b5ea44b90d8aa01979d9bc8624

  • SHA512

    3bb08cc0f6037485cb3376b0ee6e0483e4d7c118ed9ea55f6cbc7090f3a88da8e05a3e3bdfc7c963e798dd251938497071d89bf2c9b1d1d017635e7e474de16f

  • SSDEEP

    98304:qezj1AIn0R/UqPMaiBQtT7s2bumAcSU0JEigPgQ4NIRMmAVlJmZd:h0DiBQtPs0uIk0v4NIRMtVm

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Renames multiple (8951) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • XMRig Miner payload 13 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 28 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ee8d6dd653a71ef50c69e1007678e4ac6a3d0b5ea44b90d8aa01979d9bc8624.exe
    "C:\Users\Admin\AppData\Local\Temp\5ee8d6dd653a71ef50c69e1007678e4ac6a3d0b5ea44b90d8aa01979d9bc8624.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X8W64.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X8W64.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1R38u5.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1R38u5.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2236
          • C:\Users\Admin\AppData\Local\Temp\1014763001\4852f8a3ab.exe
            "C:\Users\Admin\AppData\Local\Temp\1014763001\4852f8a3ab.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4332
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4148
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3704
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1816
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1908
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              6⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1080
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4460
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                7⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1724
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1992 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fe5604b5-3ad2-40b1-8122-bd28ef6c9d59} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" gpu
                  8⤵
                    PID:2316
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2488 -prefMapHandle 2484 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e2e1017-7ec4-4691-b2fa-48c0dbc5fcc1} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" socket
                    8⤵
                      PID:1884
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3136 -childID 1 -isForBrowser -prefsHandle 1612 -prefMapHandle 3108 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c5acd5d-5bce-4db6-ae71-35538c266696} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" tab
                      8⤵
                        PID:1160
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2740 -childID 2 -isForBrowser -prefsHandle 3912 -prefMapHandle 4016 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {465de7e7-492a-45b7-bb80-e0db3df1d5a6} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" tab
                        8⤵
                          PID:4404
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4796 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4788 -prefMapHandle 4780 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a83b4420-ab75-4c3c-8423-3429d50ac185} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" utility
                          8⤵
                          • Checks processor information in registry
                          PID:6064
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -childID 3 -isForBrowser -prefsHandle 5428 -prefMapHandle 5392 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {17e2becc-9f18-4ddc-b6a9-39e4b1cec419} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" tab
                          8⤵
                            PID:3064
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5596 -childID 4 -isForBrowser -prefsHandle 5608 -prefMapHandle 5552 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {22f9b443-46cc-4999-abb9-badce6b4ef75} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" tab
                            8⤵
                              PID:2276
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5748 -childID 5 -isForBrowser -prefsHandle 5756 -prefMapHandle 5760 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {620889f9-6cf5-4414-aef7-fe5698fa3ba0} 1724 "\\.\pipe\gecko-crash-server-pipe.1724" tab
                              8⤵
                                PID:3216
                        • C:\Users\Admin\AppData\Local\Temp\1014764001\23c4c2f28c.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014764001\23c4c2f28c.exe"
                          5⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2228
                        • C:\Users\Admin\AppData\Local\Temp\1014765001\bae44c7eb1.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014765001\bae44c7eb1.exe"
                          5⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:6000
                        • C:\Users\Admin\AppData\Local\Temp\1014766001\QrIqOQJ.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014766001\QrIqOQJ.exe"
                          5⤵
                          • Executes dropped EXE
                          • Enumerates connected drives
                          • Drops file in Program Files directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:6496
                        • C:\Users\Admin\AppData\Local\Temp\1014767001\0ae2267da8.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014767001\0ae2267da8.exe"
                          5⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:12468
                        • C:\Users\Admin\AppData\Local\Temp\1014768001\0cd12cdc76.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014768001\0cd12cdc76.exe"
                          5⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          PID:11484
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 11484 -s 740
                            6⤵
                            • Program crash
                            PID:10672
                        • C:\Users\Admin\AppData\Local\Temp\1014769001\84d5d2f66b.exe
                          "C:\Users\Admin\AppData\Local\Temp\1014769001\84d5d2f66b.exe"
                          5⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:8252
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                            6⤵
                              PID:5136
                              • C:\Windows\system32\mode.com
                                mode 65,10
                                7⤵
                                  PID:11108
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                  7⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:10972
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_7.zip -oextracted
                                  7⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5564
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_6.zip -oextracted
                                  7⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:8268
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_5.zip -oextracted
                                  7⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:7616
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_4.zip -oextracted
                                  7⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:12988
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_3.zip -oextracted
                                  7⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:8864
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_2.zip -oextracted
                                  7⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1936
                                • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                  7z.exe e extracted/file_1.zip -oextracted
                                  7⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:7420
                                • C:\Windows\system32\attrib.exe
                                  attrib +H "in.exe"
                                  7⤵
                                  • Views/modifies file attributes
                                  PID:8136
                                • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                  "in.exe"
                                  7⤵
                                  • Executes dropped EXE
                                  PID:10448
                                  • C:\Windows\SYSTEM32\attrib.exe
                                    attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                    8⤵
                                    • Views/modifies file attributes
                                    PID:8420
                                  • C:\Windows\SYSTEM32\attrib.exe
                                    attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                    8⤵
                                    • Views/modifies file attributes
                                    PID:13268
                                  • C:\Windows\SYSTEM32\schtasks.exe
                                    schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                    8⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:3188
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell ping 127.0.0.1; del in.exe
                                    8⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5308
                                    • C:\Windows\system32\PING.EXE
                                      "C:\Windows\system32\PING.EXE" 127.0.0.1
                                      9⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:4140
                            • C:\Users\Admin\AppData\Local\Temp\1014770001\26c2677cbf.exe
                              "C:\Users\Admin\AppData\Local\Temp\1014770001\26c2677cbf.exe"
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              PID:12368
                              • C:\Users\Admin\AppData\Local\Temp\1014770001\26c2677cbf.exe
                                "C:\Users\Admin\AppData\Local\Temp\1014770001\26c2677cbf.exe"
                                6⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:5180
                            • C:\Users\Admin\AppData\Local\Temp\1014771001\267d9f016d.exe
                              "C:\Users\Admin\AppData\Local\Temp\1014771001\267d9f016d.exe"
                              5⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Checks processor information in registry
                              PID:10896
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1014771001\267d9f016d.exe" & rd /s /q "C:\ProgramData\K6FKFKXLN7QQ" & exit
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:9872
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /t 10
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  • Delays execution with timeout.exe
                                  PID:1364
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 10896 -s 2056
                                6⤵
                                • Program crash
                                PID:13300
                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b22O.exe
                          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b22O.exe
                          3⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3644
                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4M744p.exe
                        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4M744p.exe
                        2⤵
                        • Modifies Windows Defender Real-time Protection settings
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Windows security modification
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3472
                    • C:\Windows\system32\vssvc.exe
                      C:\Windows\system32\vssvc.exe
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4912
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:5460
                    • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:740
                      • C:\Windows\explorer.exe
                        explorer.exe
                        2⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:11164
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                        2⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:10432
                        • C:\Windows\system32\PING.EXE
                          "C:\Windows\system32\PING.EXE" 127.1.10.1
                          3⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:12680
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 10896 -ip 10896
                      1⤵
                        PID:8780
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 11484 -ip 11484
                        1⤵
                          PID:12520
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:10348
                        • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                          1⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:5584
                          • C:\Windows\explorer.exe
                            explorer.exe
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:7172
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                            2⤵
                            • System Network Configuration Discovery: Internet Connection Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:12448
                            • C:\Windows\system32\PING.EXE
                              "C:\Windows\system32\PING.EXE" 127.1.10.1
                              3⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:12208

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files (x86)\README.TXT

                          Filesize

                          533B

                          MD5

                          81d185495b4e6430a87dfd37789bb872

                          SHA1

                          b5da653f81a548c74205c7ae3d19f30af1a14271

                          SHA256

                          838d654b9cb0360d8b3bb767db8fc1954fc41ba0a56fc34688aad9b50f5ddb40

                          SHA512

                          1106c9c2245cbd44effb42e4e1365eb796d3b2390b011fb97205550bf183b097c489194aa001f97f949e9d1ed1c970eea6cbb0477da47511e5bc18e88bf2dfa5

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                          Filesize

                          2KB

                          MD5

                          6cf293cb4d80be23433eecf74ddb5503

                          SHA1

                          24fe4752df102c2ef492954d6b046cb5512ad408

                          SHA256

                          b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                          SHA512

                          0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\08ZTJJXR\download[1].htm

                          Filesize

                          1B

                          MD5

                          cfcd208495d565ef66e7dff9f98764da

                          SHA1

                          b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                          SHA256

                          5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                          SHA512

                          31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                          Filesize

                          1KB

                          MD5

                          548dd08570d121a65e82abb7171cae1c

                          SHA1

                          1a1b5084b3a78f3acd0d811cc79dbcac121217ab

                          SHA256

                          cdf17b8532ebcebac3cfe23954a30aa32edd268d040da79c82687e4ccb044adc

                          SHA512

                          37b98b09178b51eec9599af90d027d2f1028202efc1633047e16e41f1a95610984af5620baac07db085ccfcb96942aafffad17aa1f44f63233e83869dc9f697b

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json

                          Filesize

                          19KB

                          MD5

                          3aba3e1273c0d4f49a0b470857ccacb6

                          SHA1

                          2751a32d3857b4555d20f34d859407ab0de16798

                          SHA256

                          250eac29441363b3a0453ec91c98ad5a5d213771d6d60bc82cd1840ab93da4be

                          SHA512

                          1d843e265e4c8f3b67ee95a3d97131ca7170cdc074d32e9cf1ddae30e34b06694d22ecf945c3c9287ca8fdf56b861bb6a0eb52c8f0d9198707802464a541c1dc

                        • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                          Filesize

                          15KB

                          MD5

                          96c542dec016d9ec1ecc4dddfcbaac66

                          SHA1

                          6199f7648bb744efa58acf7b96fee85d938389e4

                          SHA256

                          7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                          SHA512

                          cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                        • C:\Users\Admin\AppData\Local\Temp\1014763001\4852f8a3ab.exe

                          Filesize

                          947KB

                          MD5

                          eaff0e1b19c0963eb494259f8e44efaa

                          SHA1

                          3a94d47e81d7af91bc23bdf8e309498dbd86da92

                          SHA256

                          cbaf9ec4951a501dcffee4794ca322bb568048defdcbb83bd884a95f65dd25b7

                          SHA512

                          ca044f97ed53f4c6418a94e5f50324407c27007072f127c33dad6ec1109ed5bbc0b043b39fff1864648109973279e515d4249d409925c222ca11753f436865cd

                        • C:\Users\Admin\AppData\Local\Temp\1014764001\23c4c2f28c.exe

                          Filesize

                          1.7MB

                          MD5

                          96d7b86ac1fffed8abb73322b4fe7125

                          SHA1

                          ab1b08549fbcf47858c9f331ee5f7c9b2308ee90

                          SHA256

                          fbb2704c3cfd64e0eaba8c782d63d890bdc314d271639bd89b2abddffc74b1dd

                          SHA512

                          547b8519586239995630dfa34d604c96e7ecc93d656ec7c942b40fb678cd30040ad7e75e5e5b1745db2b90b02ed3a465476f75cf2f47d335248293486b5dfb27

                        • C:\Users\Admin\AppData\Local\Temp\1014765001\bae44c7eb1.exe

                          Filesize

                          2.7MB

                          MD5

                          ffbe6b2984a14f95d10033902a9a38a0

                          SHA1

                          02114e6fe2efa5de3a89c65e7529cdaf74adaa5a

                          SHA256

                          3acd544ea80fda4ff8f4ae9d6e1cec929762dfb44f66c9fff9c9c5b3fb6d92c9

                          SHA512

                          2808adbaf91657e256a6f845090729d078002188aa34770bdfba64aad3329ec64dc359201bac242b600304708e14bd15f8324d886187a63c568ce833b413fd33

                        • C:\Users\Admin\AppData\Local\Temp\1014766001\QrIqOQJ.exe

                          Filesize

                          1.1MB

                          MD5

                          42a8588cc82773cd223c42f8fe4be91a

                          SHA1

                          e2ed3cda00140ecd445f5f742729d34f2c452c8c

                          SHA256

                          d4521c34f489f4a6065dea15634df9bb700c84741f476bde1084d9cdfb373a7b

                          SHA512

                          681e4b155ce1015723469bd819618b292844aa00f7dab447d9557e244792efcef5614f753283efe9dd76ea77b838af78a3e69008c380482a4412b1cea75c535d

                        • C:\Users\Admin\AppData\Local\Temp\1014767001\0ae2267da8.exe

                          Filesize

                          2.5MB

                          MD5

                          2a78ce9f3872f5e591d643459cabe476

                          SHA1

                          9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                          SHA256

                          21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                          SHA512

                          03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                        • C:\Users\Admin\AppData\Local\Temp\1014768001\0cd12cdc76.exe

                          Filesize

                          1.9MB

                          MD5

                          2e164f8eb316718ae1c48ed84e05dc9f

                          SHA1

                          653b1c1598a62782b58e52dd3f2c53355aad94fa

                          SHA256

                          323426e01a17e9974e2c710c0708a7232d250a2a7aa815ee7fdfac5f634af0e2

                          SHA512

                          4c47f3284fb5220338700b8a86892184fc9956844dd041a88b47d35ebabbb4a70a3922158f02c3f40e594a74f70e6c1f929750404a2b09240535ed7d91dce4a4

                        • C:\Users\Admin\AppData\Local\Temp\1014769001\84d5d2f66b.exe

                          Filesize

                          4.2MB

                          MD5

                          3a425626cbd40345f5b8dddd6b2b9efa

                          SHA1

                          7b50e108e293e54c15dce816552356f424eea97a

                          SHA256

                          ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                          SHA512

                          a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                        • C:\Users\Admin\AppData\Local\Temp\1014770001\26c2677cbf.exe

                          Filesize

                          710KB

                          MD5

                          28e568616a7b792cac1726deb77d9039

                          SHA1

                          39890a418fb391b823ed5084533e2e24dff021e1

                          SHA256

                          9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                          SHA512

                          85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                        • C:\Users\Admin\AppData\Local\Temp\1014771001\267d9f016d.exe

                          Filesize

                          384KB

                          MD5

                          dfd5f78a711fa92337010ecc028470b4

                          SHA1

                          1a389091178f2be8ce486cd860de16263f8e902e

                          SHA256

                          da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                          SHA512

                          a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4M744p.exe

                          Filesize

                          2.7MB

                          MD5

                          54ca5bbad5f958529c1cb4cbf073ce8c

                          SHA1

                          eb915daa2f1942a34c16639436c0db9016007df7

                          SHA256

                          21a338e73648a78740691819d4627cea3813b99c2e4c9d5fa6804aa72edc80a3

                          SHA512

                          3494d2793ae9b2369d994cb7ac1469a0e57e0635798cc91854e7bd497eb13400cf0a268c597b9470b9c557c2290702866454c15d8c2cd3d1f1d70f3c274f38af

                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\X8W64.exe

                          Filesize

                          3.5MB

                          MD5

                          e69a7d6e003fc0535e9b92c583126a12

                          SHA1

                          10a0dbc5eac00df9ed808cf7a3aae36f3c8ed827

                          SHA256

                          526b2199e2fd2e1a04f3d879295b7713f54194713fc846e8ba401a38a6fa7856

                          SHA512

                          6b2cf4de51205e5e6223ace35b170ae615a7a03657ef7a4ed637a4968d3ce54df44a37e52d35cc0b5e2e2f335d319ef7cd137a10b4f49a9d1a8fd94c7fe8c50b

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1R38u5.exe

                          Filesize

                          3.1MB

                          MD5

                          01833088c8d6bc355bbb0469c95435b7

                          SHA1

                          a98b045f0809ecd4aac8b1f1ff31ed614e1cd698

                          SHA256

                          c5c376615760a2511b3144d811e1f7ce71f0b7f869e38786e0bb8363f69daba4

                          SHA512

                          b94f6be0f7aa84634b42eb2f06df1f7114a1fcb1a01fb75054c5936f2d68ea1d3b7db675d2cd3c436192af4ab8f843aa4df2d6382f3fb54022e23d329476212d

                        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3b22O.exe

                          Filesize

                          1.7MB

                          MD5

                          56e12bcc2bb16375c498e5ce71d2931c

                          SHA1

                          20adcd7bd6a7e620643f67bdffad49741eb8721c

                          SHA256

                          6cf1009c216fd7f75654de4106d1473cead2c4e59185d28f2cafa562e14e9101

                          SHA512

                          3020f7e04909f97b1c50f29f9ea66801f389977e3316e7bded69daba22b5f22b304eec2659c4ea6394f14e617fee7cc2de4a1b3574f9488d3e0782d04c1c0416

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l1vbalx1.4ht.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                          Filesize

                          1.6MB

                          MD5

                          72491c7b87a7c2dd350b727444f13bb4

                          SHA1

                          1e9338d56db7ded386878eab7bb44b8934ab1bc7

                          SHA256

                          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                          SHA512

                          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                          Filesize

                          458KB

                          MD5

                          619f7135621b50fd1900ff24aade1524

                          SHA1

                          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                          SHA256

                          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                          SHA512

                          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                          Filesize

                          2.2MB

                          MD5

                          579a63bebccbacab8f14132f9fc31b89

                          SHA1

                          fca8a51077d352741a9c1ff8a493064ef5052f27

                          SHA256

                          0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                          SHA512

                          4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                          Filesize

                          1.7MB

                          MD5

                          5659eba6a774f9d5322f249ad989114a

                          SHA1

                          4bfb12aa98a1dc2206baa0ac611877b815810e4c

                          SHA256

                          e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                          SHA512

                          f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                          Filesize

                          1.7MB

                          MD5

                          5404286ec7853897b3ba00adf824d6c1

                          SHA1

                          39e543e08b34311b82f6e909e1e67e2f4afec551

                          SHA256

                          ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                          SHA512

                          c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                          Filesize

                          1.7MB

                          MD5

                          5eb39ba3698c99891a6b6eb036cfb653

                          SHA1

                          d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                          SHA256

                          e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                          SHA512

                          6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                          Filesize

                          1.7MB

                          MD5

                          7187cc2643affab4ca29d92251c96dee

                          SHA1

                          ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                          SHA256

                          c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                          SHA512

                          27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                          Filesize

                          1.7MB

                          MD5

                          b7d1e04629bec112923446fda5391731

                          SHA1

                          814055286f963ddaa5bf3019821cb8a565b56cb8

                          SHA256

                          4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                          SHA512

                          79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                          Filesize

                          1.7MB

                          MD5

                          0dc4014facf82aa027904c1be1d403c1

                          SHA1

                          5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                          SHA256

                          a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                          SHA512

                          cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                          Filesize

                          3.3MB

                          MD5

                          cea368fc334a9aec1ecff4b15612e5b0

                          SHA1

                          493d23f72731bb570d904014ffdacbba2334ce26

                          SHA256

                          07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                          SHA512

                          bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                        • C:\Users\Admin\AppData\Local\Temp\main\extracted\in.exe

                          Filesize

                          1.7MB

                          MD5

                          83d75087c9bf6e4f07c36e550731ccde

                          SHA1

                          d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                          SHA256

                          46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                          SHA512

                          044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                        • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                          Filesize

                          3.3MB

                          MD5

                          045b0a3d5be6f10ddf19ae6d92dfdd70

                          SHA1

                          0387715b6681d7097d372cd0005b664f76c933c7

                          SHA256

                          94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                          SHA512

                          58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                        • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                          Filesize

                          440B

                          MD5

                          3626532127e3066df98e34c3d56a1869

                          SHA1

                          5fa7102f02615afde4efd4ed091744e842c63f78

                          SHA256

                          2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                          SHA512

                          dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                          Filesize

                          6KB

                          MD5

                          c8966ca504d844138ab7b1df250950a9

                          SHA1

                          0e7158fee16a906bde71ec89736ea7c70e629650

                          SHA256

                          48bcf4624fafc33279d268273400ac1ec2c8cc5332f1a615732ad806b8391ccb

                          SHA512

                          d82c69c6da0bf0a33c92432d496f17f6b45bc2a7690bf6c86fbc6ed0f704d96bc42930f633b77027b9b1fd563901c89cd98476df4d13bec3ef013ef841901993

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                          Filesize

                          8KB

                          MD5

                          3186a5b9d2f732d69c0182cc512cb8f4

                          SHA1

                          6425a4dcabab38780b4a535c02d2b980199906ee

                          SHA256

                          141a3e18ec3d1c266eec2975a39222f6d179a5429802692ae82e72e87fa20009

                          SHA512

                          9bf4f1868acaad225621dd92e981a5951c6abc085064d92e93f6c40c7c0c45946248a6e2f05bb24260b9d089ca6ebc78bcc5db32c78260ca0b13a56d406ff9c2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                          Filesize

                          10KB

                          MD5

                          673a15349762c966a67e8e65018f127e

                          SHA1

                          2eb38e82a1fef07306302c3d7372d8f93e8f8415

                          SHA256

                          1ad7b8d52791f4a7652f96b91b034b8d15e6c173aa0580f5b06373f850ec7e70

                          SHA512

                          ac74a349769b2d1b5656d6aea5e6d34da0d51bb80f511292ecc91a2416725c3becbeb122cc47beba4fae3cfe995445697bc2ad903adaaa65e6d35c251f4ff9f9

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                          Filesize

                          13KB

                          MD5

                          a2192f6b223e694d74fbaa4cf014f15b

                          SHA1

                          78cee99b496de391f2ecf69bb00cbabc24efa513

                          SHA256

                          c729616bacef82d8aa8ef7e54f7e02529d6d69ce32ce2507b9b3ccff1de24e5b

                          SHA512

                          6f2d662088dee342b5e190e80e3195920d840353b5399288ea7ca93bf4d48a05c00170db6d859a7f9c732140c9d6e11aedd31e7d9575dcbf474e06b3f36251b2

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          22KB

                          MD5

                          942fd338062b2dc702076fb7d8480f75

                          SHA1

                          768971c7432035e413cfe9f971fb748d27e8fed0

                          SHA256

                          6291a141fa58700e23e095f2a067df92d7b0cd2c9e4de3609d5fda55932a9c39

                          SHA512

                          f4642facb0993c67e63aee89181f4431410f86477bdca82e96fc721bb07efe9001ba0c4b229cce7c175105ef05c0823975d5e0b0ca55e3d429a0f924ebcb76cd

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          5KB

                          MD5

                          6aef25082ed90a102b73a891d399881e

                          SHA1

                          fed242a18bd130f68d49b8ccf65f9ddbb38d91de

                          SHA256

                          36201564d56f90ed2acaaa4a4dde0e2c91ff477dbc191d7b735d9e6b2ae33f4a

                          SHA512

                          721703b5bcd9dc6213897507cbb9951891cd8555354a2043ec63b554714cf5380edf6fc2b8eba307089829179a7ce59bd2ae3c465330914e0f35b5047971ce76

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          6KB

                          MD5

                          f256ed352b009a044759190899ac5f4c

                          SHA1

                          f50ead5a690f63d3e679fda658521492111f2539

                          SHA256

                          04debfcb1a69d06336f64f5bcd862e5a417788e956e6947c7053333952526f53

                          SHA512

                          c85f77cbb11f942a698efe4833b43bc0b97015931e07cbde07ea5ef4689cdcedae5e16924d719e2377bf255cb6f808842978776b49c01f6c2d4913cc11c9da2a

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin

                          Filesize

                          5KB

                          MD5

                          a5197f6e38d5469d8e65941cbbefe8d1

                          SHA1

                          053d02e782ed699be5cb20c0b67394f19a551a35

                          SHA256

                          ee6e4fcbc0e0ead5747183374d37bf97b0f343cbfeaf3d7a3d24ad193b4cba6c

                          SHA512

                          6c0fe031164baa0a573721e8ce1ed922f2a66da0ee68ca15c7530175500ad67a11e4f46fc87c640d2be2880e57016a19c40e08fe6daa50615ac8b3de0b236cca

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          91cb095687369fe65e29ef0c485fa91a

                          SHA1

                          9c3997ea98612a43d87e707a16a1fcbabc94e2eb

                          SHA256

                          d37263d1a4007bc125473463b8973cd6a619be6d6c2a5d3f3f9449abf685b00a

                          SHA512

                          586a3e2990c4d4c0d65b1e37b7192057134612ea706bd5450d9dc6c6464115ee89f76b4283555cd1dd6ad8c37580d7870b3efe4eddd54f99a397c3a7198665fa

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          0571cd5f32d6a90a64509d20b72f1939

                          SHA1

                          48858c79dd72e77a4bd724900bb696ea2b22a79f

                          SHA256

                          257867b34267191ea75e67a2ca476c3787b028b4efa0fd4482168d83eddcb19b

                          SHA512

                          678bdb2d0f62a365c5545a0d60c8dfdca259fab27d6e368b300bc937e281864204d242f6c1c28d877ea4908f95d6cbcac31efdb36b24f7bc2f2909bb2c85c90f

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          31a542993c3213d87f615c0fee8e66c0

                          SHA1

                          f5862b99c3bb8260fe1a873e9230cd589ac79683

                          SHA256

                          8cedce67fb4e955ee69eac3d2c55db67dab5bdef42c7c339945890d32f77799f

                          SHA512

                          5e13c576348833241529c59b2eb068907c9509369a0c5022e64b623cf638ee4f00058ea475af15a8311514c721e99322dd337a673babf2831a6820a573c4bfd5

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          5KB

                          MD5

                          21e6cd39f600469498314bb780d6d5c9

                          SHA1

                          761be400337ce9aef1f4b28004f167b9d87e98cb

                          SHA256

                          6daf160d13d92a30d1be11e806bbb3d3181b0f3ece9fc11a8f585e491d710212

                          SHA512

                          3131685ce919d85f4edb3d5e3e6ef0c025468adc243fa7484c255edc9f8333aba1d0d9d257f8d57be7331532692ed1f1dd31766af9bc5e1b17979ea7a479a553

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                          Filesize

                          6KB

                          MD5

                          b50823a8ea48b03b4a5c99ee613b8e56

                          SHA1

                          15dcfd76c04e6db5e62b7822b03a490ff76b15aa

                          SHA256

                          45e5a636fad22d680ca222a76fc5b877eb8696bc34d73c66234fa10d6a18c32d

                          SHA512

                          6363295b1e38566365268329c3295cded2f74e46d476ea5472f1f9a39898fa5175ed3c98b96f51350830a3318870363993e55580f0fa6f553a3315b718a3e9d9

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\25005085-ad88-4835-b4bd-683bb5037bfa

                          Filesize

                          982B

                          MD5

                          b0fcd21dc4b4a0d2dce0f40035ca876e

                          SHA1

                          aef5f5661bbe07b15498f60920d1001407f64519

                          SHA256

                          eddb62268d4a19afbf1106b501620f8ed0075350d8dfeb5fad0d2bdc791b64b3

                          SHA512

                          775a77cdbb26f0c597cee6efe8fd801c2266448dc0c2517ea08de316a0f658f25912e597fa6b2251c6c5cfb6f364c235154a16cf38f3578084a4deb106b664a3

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\4f342f60-593b-4891-b140-f20a12999602

                          Filesize

                          671B

                          MD5

                          6276013d40c660b504e0e0387868ba16

                          SHA1

                          5106da09ef1108cd98964ac7ce5d830b57ff040a

                          SHA256

                          2b57e5954acfb65594c82a6344b90dd82802f42bbe76a971bdffe5ab3ee3519e

                          SHA512

                          30af21328754a91fb108294f4c1c33e37678f2b5267bf1218d04e1b97b00317ac8867c337fa6b5722d143c5039b8d4ed1dccaf55eb7cdccceadf8ad0859c5bb9

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\9a88b2bd-99a2-46e7-9138-b5d1ad68b1c4

                          Filesize

                          27KB

                          MD5

                          94ea1d6bdfa74657730bb627ee0a3743

                          SHA1

                          648cf80d28b10b722e65f42ada5902cc0f5da0c3

                          SHA256

                          be30a65acb9491d8c52497ff7761dd3aaa18d0386857e6e51b8aad8bf811a9c1

                          SHA512

                          828e8a54b3de31770c4802ef04e6c5382bc85771d5457bf489cbc15d1a22f1b9381c183ce1d9e541908ba11994e43f398c6dcb2f856eb584add0862ace25116b

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                          Filesize

                          10KB

                          MD5

                          e45d33116ae75544fb29441fb5354ef3

                          SHA1

                          7e2981a8320ddb55ca581c6be54e1e1ee81c4e3c

                          SHA256

                          d124ae3bde0b1fbbec8668814b3cc067ef4b2376db7e27a0d26a53b40107ebea

                          SHA512

                          650e57d955a05c415e1812c2de7a12cf89e65375a321dc2f1743f542c944d8a3eec841c705beeb1dafcd4bb00723a2341973002345a8f9e3a024b745eaabcea7

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs.js

                          Filesize

                          10KB

                          MD5

                          d8e5446963025189a940404c2ccdf908

                          SHA1

                          bbeae59454fb5b9e3c1979007314edd31756ef9e

                          SHA256

                          42af29231e0930ba9fc938599287a049735c640e3b591b91584e556eea39f55a

                          SHA512

                          2241c02930ecc3b341507f9400c1c0324641528717aafe0ecf39a6c646e4e1a1662ed14fec9418e835e8db67403fba3c849356b7832b530d1b857814db20962b

                        • memory/740-21203-0x00007FF7A4350000-0x00007FF7A47E0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/740-21217-0x00007FF7A4350000-0x00007FF7A47E0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/2228-80-0x00000000009E0000-0x000000000107B000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/2228-94-0x00000000009E0000-0x000000000107B000-memory.dmp

                          Filesize

                          6.6MB

                        • memory/2236-32-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-21260-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-21290-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-20149-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-883-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-21237-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-21248-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-21257-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-10966-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-21258-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-21189-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-63-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-79-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2236-21259-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2652-16-0x0000000000CB1000-0x0000000000D19000-memory.dmp

                          Filesize

                          416KB

                        • memory/2652-14-0x0000000000CB0000-0x0000000000FCB000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2652-17-0x0000000000CB0000-0x0000000000FCB000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2652-18-0x0000000000CB0000-0x0000000000FCB000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2652-30-0x0000000000CB0000-0x0000000000FCB000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/2652-15-0x0000000076FA4000-0x0000000076FA6000-memory.dmp

                          Filesize

                          8KB

                        • memory/2652-31-0x0000000000CB1000-0x0000000000D19000-memory.dmp

                          Filesize

                          416KB

                        • memory/3472-775-0x0000000000A00000-0x0000000000CBE000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3472-43-0x0000000000A00000-0x0000000000CBE000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3472-44-0x0000000000A00000-0x0000000000CBE000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3472-89-0x0000000000A00000-0x0000000000CBE000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3472-42-0x0000000000A00000-0x0000000000CBE000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/3644-36-0x0000000000940000-0x0000000000FC2000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/3644-38-0x0000000000940000-0x0000000000FC2000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/5180-21123-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/5180-21121-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/5180-21125-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB

                        • memory/5308-21184-0x000001E1D1C90000-0x000001E1D1CB2000-memory.dmp

                          Filesize

                          136KB

                        • memory/5460-21197-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/5460-21191-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/5584-21262-0x00007FF7A4350000-0x00007FF7A47E0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/5584-21275-0x00007FF7A4350000-0x00007FF7A47E0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/6000-850-0x0000000000380000-0x0000000000638000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/6000-848-0x0000000000380000-0x0000000000638000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/6000-849-0x0000000000380000-0x0000000000638000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/6000-9241-0x0000000000380000-0x0000000000638000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/6000-7793-0x0000000000380000-0x0000000000638000-memory.dmp

                          Filesize

                          2.7MB

                        • memory/7172-21276-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/7172-21278-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/7172-21279-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/10348-21264-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/10348-21261-0x0000000000C50000-0x0000000000F6B000-memory.dmp

                          Filesize

                          3.1MB

                        • memory/10448-21161-0x00007FF69FD60000-0x00007FF6A01F0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/10448-21159-0x00007FF69FD60000-0x00007FF6A01F0000-memory.dmp

                          Filesize

                          4.6MB

                        • memory/10896-21233-0x0000000000400000-0x000000000064B000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/11164-21206-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11164-21205-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11164-21214-0x0000000000ED0000-0x0000000000EF0000-memory.dmp

                          Filesize

                          128KB

                        • memory/11164-21215-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11164-21204-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11164-21220-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11164-21213-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11164-21207-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11164-21211-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11164-21210-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11164-21209-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11164-21208-0x0000000140000000-0x0000000140770000-memory.dmp

                          Filesize

                          7.4MB

                        • memory/11484-21256-0x0000000000400000-0x0000000000C6E000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/11484-21239-0x0000000000400000-0x0000000000C6E000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/11484-21201-0x0000000000400000-0x0000000000C6E000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/11484-21085-0x0000000000400000-0x0000000000C6E000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/11484-21077-0x0000000010000000-0x000000001001C000-memory.dmp

                          Filesize

                          112KB

                        • memory/11484-21067-0x0000000000400000-0x0000000000C6E000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/11484-13400-0x0000000000400000-0x0000000000C6E000-memory.dmp

                          Filesize

                          8.4MB

                        • memory/12468-21240-0x0000000000400000-0x0000000000457000-memory.dmp

                          Filesize

                          348KB