Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/12/2024, 22:50

General

  • Target

    d9865442479ec9a282ff312cd91481710f9b6e21330be30a68fa16bf36c0799fN.exe

  • Size

    3.0MB

  • MD5

    ad7f121646aa374af133772519375710

  • SHA1

    4e85ad004aa170ed53b7818b78e0b12e042b18ea

  • SHA256

    d9865442479ec9a282ff312cd91481710f9b6e21330be30a68fa16bf36c0799f

  • SHA512

    fbe1dfd40bc2fa8c6617823d32023dba5625c5e7cb235f87b284f1166a30d64e75781e80b2586e4a6f7ada4cda9df3e17f1d61829705647c71232a2f902c81c3

  • SSDEEP

    49152:6UAh2jV6Tj3t5FH+2Qy0GsO7wXRzFxa73lx5:6UAh2jVej3jFH+2QyQO7ghO35

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://shineugler.biz/api

https://tacitglibbr.biz/api

Extracted

Family

cryptbot

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://drive-connect.cyou/api

https://shineugler.biz/api

https://tacitglibbr.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • XMRig Miner payload 10 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 27 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9865442479ec9a282ff312cd91481710f9b6e21330be30a68fa16bf36c0799fN.exe
    "C:\Users\Admin\AppData\Local\Temp\d9865442479ec9a282ff312cd91481710f9b6e21330be30a68fa16bf36c0799fN.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:216
      • C:\Users\Admin\AppData\Local\Temp\1015800001\342f51b240.exe
        "C:\Users\Admin\AppData\Local\Temp\1015800001\342f51b240.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4660
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:884
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:2212
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p24291711423417250691697322505 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2552
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_7.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4896
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_6.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:380
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1056
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4844
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1920
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1108
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3076
            • C:\Windows\system32\attrib.exe
              attrib +H "in.exe"
              5⤵
              • Views/modifies file attributes
              PID:2948
            • C:\Users\Admin\AppData\Local\Temp\main\in.exe
              "in.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4436
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:3960
              • C:\Windows\SYSTEM32\attrib.exe
                attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                6⤵
                • Views/modifies file attributes
                PID:1256
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:3776
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell ping 127.0.0.1; del in.exe
                6⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:224
                • C:\Windows\system32\PING.EXE
                  "C:\Windows\system32\PING.EXE" 127.0.0.1
                  7⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:1600
        • C:\Users\Admin\AppData\Local\Temp\1015801001\ea5e3475f2.exe
          "C:\Users\Admin\AppData\Local\Temp\1015801001\ea5e3475f2.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4832
          • C:\Users\Admin\AppData\Local\Temp\1015801001\ea5e3475f2.exe
            "C:\Users\Admin\AppData\Local\Temp\1015801001\ea5e3475f2.exe"
            4⤵
            • Executes dropped EXE
            PID:1236
          • C:\Users\Admin\AppData\Local\Temp\1015801001\ea5e3475f2.exe
            "C:\Users\Admin\AppData\Local\Temp\1015801001\ea5e3475f2.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2924
        • C:\Users\Admin\AppData\Local\Temp\1015802001\1bd588112f.exe
          "C:\Users\Admin\AppData\Local\Temp\1015802001\1bd588112f.exe"
          3⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3308
        • C:\Users\Admin\AppData\Local\Temp\1015803001\177b3acfa8.exe
          "C:\Users\Admin\AppData\Local\Temp\1015803001\177b3acfa8.exe"
          3⤵
          • Enumerates VirtualBox registry keys
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4212
        • C:\Users\Admin\AppData\Local\Temp\1015804001\be679e5602.exe
          "C:\Users\Admin\AppData\Local\Temp\1015804001\be679e5602.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:2460
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1015804001\be679e5602.exe" & rd /s /q "C:\ProgramData\ASRIWTRQIEUA" & exit
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3272
            • C:\Windows\SysWOW64\timeout.exe
              timeout /t 10
              5⤵
              • System Location Discovery: System Language Discovery
              • Delays execution with timeout.exe
              PID:3600
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2460 -s 2020
            4⤵
            • Program crash
            PID:4236
        • C:\Users\Admin\AppData\Local\Temp\1015805001\fc95371c79.exe
          "C:\Users\Admin\AppData\Local\Temp\1015805001\fc95371c79.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:3456
        • C:\Users\Admin\AppData\Local\Temp\1015806001\471d3aa0c9.exe
          "C:\Users\Admin\AppData\Local\Temp\1015806001\471d3aa0c9.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2732
          • C:\Users\Admin\AppData\Local\Temp\BT9KU4PWKDP3AMFR2PAT9K231W62.exe
            "C:\Users\Admin\AppData\Local\Temp\BT9KU4PWKDP3AMFR2PAT9K231W62.exe"
            4⤵
            • Modifies Windows Defender Real-time Protection settings
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Windows security modification
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4656
          • C:\Users\Admin\AppData\Local\Temp\XY2A8PPIXDTFQ8MHX9S6GN7ANZXH.exe
            "C:\Users\Admin\AppData\Local\Temp\XY2A8PPIXDTFQ8MHX9S6GN7ANZXH.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3992
        • C:\Users\Admin\AppData\Local\Temp\1015807001\8f36e42557.exe
          "C:\Users\Admin\AppData\Local\Temp\1015807001\8f36e42557.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:4968
        • C:\Users\Admin\AppData\Local\Temp\1015808001\8f64538c39.exe
          "C:\Users\Admin\AppData\Local\Temp\1015808001\8f64538c39.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:4100
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM firefox.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1868
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM chrome.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1128
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM msedge.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2080
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM opera.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4716
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /F /IM brave.exe /T
            4⤵
            • System Location Discovery: System Language Discovery
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1396
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
            4⤵
              PID:5032
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                5⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:4376
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2004 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7331d2c4-509f-4237-835b-c3de8c6ac513} 4376 "\\.\pipe\gecko-crash-server-pipe.4376" gpu
                  6⤵
                    PID:1992
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {147850bc-0b59-49bb-8adf-55d3bb88401c} 4376 "\\.\pipe\gecko-crash-server-pipe.4376" socket
                    6⤵
                      PID:4128
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3396 -childID 1 -isForBrowser -prefsHandle 3388 -prefMapHandle 3384 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {76740bcd-32aa-4720-956a-57b6a0c36d27} 4376 "\\.\pipe\gecko-crash-server-pipe.4376" tab
                      6⤵
                        PID:3956
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4040 -childID 2 -isForBrowser -prefsHandle 3872 -prefMapHandle 3376 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5fe287a6-1a0b-44df-8d09-b9be270d08bd} 4376 "\\.\pipe\gecko-crash-server-pipe.4376" tab
                        6⤵
                          PID:5088
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4712 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4676 -prefMapHandle 4668 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {00cfad9b-ed75-4ad6-97a4-78b55eca1fee} 4376 "\\.\pipe\gecko-crash-server-pipe.4376" utility
                          6⤵
                          • Checks processor information in registry
                          PID:3704
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5444 -childID 3 -isForBrowser -prefsHandle 5276 -prefMapHandle 5472 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f56444d-ac7e-4c19-8a5b-f19f9f3df742} 4376 "\\.\pipe\gecko-crash-server-pipe.4376" tab
                          6⤵
                            PID:3752
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5668 -childID 4 -isForBrowser -prefsHandle 5676 -prefMapHandle 5680 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4650304-abf5-496d-afbd-bb47bf6efd86} 4376 "\\.\pipe\gecko-crash-server-pipe.4376" tab
                            6⤵
                              PID:2236
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5936 -childID 5 -isForBrowser -prefsHandle 5892 -prefMapHandle 5792 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0fc6e2d-428e-4bed-a85f-25efcb8ce4fc} 4376 "\\.\pipe\gecko-crash-server-pipe.4376" tab
                              6⤵
                                PID:4048
                        • C:\Users\Admin\AppData\Local\Temp\1015809001\d118853b9f.exe
                          "C:\Users\Admin\AppData\Local\Temp\1015809001\d118853b9f.exe"
                          3⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4536
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1224
                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                      1⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4900
                    • C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:5084
                      • C:\Windows\explorer.exe
                        explorer.exe
                        2⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3264
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell ping 127.1.10.1; del Intel_PTT_EK_Recertification.exe
                        2⤵
                        • System Network Configuration Discovery: Internet Connection Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1444
                        • C:\Windows\system32\PING.EXE
                          "C:\Windows\system32\PING.EXE" 127.1.10.1
                          3⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:3032
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2460 -ip 2460
                      1⤵
                        PID:4228

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                              Filesize

                              2KB

                              MD5

                              6cf293cb4d80be23433eecf74ddb5503

                              SHA1

                              24fe4752df102c2ef492954d6b046cb5512ad408

                              SHA256

                              b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                              SHA512

                              0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              58b80fe8da7d23cd3c9707f4ce93457e

                              SHA1

                              7d1c58b992631d82cabd38d738ccca072c91c124

                              SHA256

                              4479db3e2faf952801a1506140f3612e267e9bb4f5d509b0d63204429de8eef3

                              SHA512

                              82ef5d29aaf46b5fef467185193f03612058c4bbd7b9926293a79c18deefe137811f95dc59feaa649376c8711ca3253177177b538d2d953147db1ed719cba5e8

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json

                              Filesize

                              19KB

                              MD5

                              01f9be6ae366ec4809059a16095c02d6

                              SHA1

                              9d87cf389e2e2c7edb9d9f2c5634010e821c8465

                              SHA256

                              b1f94fcb73783a1ba88cf5fb6c4356356e98472c4ab6f6adf6308aa41634e977

                              SHA512

                              466b164c2656896693da048cd9cf4443ea1b5bfabe85a9b936a24759a136039384db48e0f258b30bc8d991ebaa82f1d73073d773ddb1c70c9e2b65cd2cc2c075

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                              Filesize

                              13KB

                              MD5

                              f35a09b50392214e0cd558dedeed57b7

                              SHA1

                              7e34252e3cfd2ed0c1a8c61d477e143ceb12a61f

                              SHA256

                              76269c04d6ace4adcf10764ddfc663b37cbc01d0d3d8f8fe95e30940b56da268

                              SHA512

                              f3c1f138e0b9c1bfbfca4d75aa850f23387c8f5003089c8450e1b2c4ffab15d096372cf843ba2161c9ef53a6476f1069c763f35e26c0e826190b8129df257e4f

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                              Filesize

                              15KB

                              MD5

                              96c542dec016d9ec1ecc4dddfcbaac66

                              SHA1

                              6199f7648bb744efa58acf7b96fee85d938389e4

                              SHA256

                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                              SHA512

                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                            • C:\Users\Admin\AppData\Local\Temp\1015800001\342f51b240.exe

                              Filesize

                              4.2MB

                              MD5

                              3a425626cbd40345f5b8dddd6b2b9efa

                              SHA1

                              7b50e108e293e54c15dce816552356f424eea97a

                              SHA256

                              ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                              SHA512

                              a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                            • C:\Users\Admin\AppData\Local\Temp\1015801001\ea5e3475f2.exe

                              Filesize

                              710KB

                              MD5

                              28e568616a7b792cac1726deb77d9039

                              SHA1

                              39890a418fb391b823ed5084533e2e24dff021e1

                              SHA256

                              9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                              SHA512

                              85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                            • C:\Users\Admin\AppData\Local\Temp\1015802001\1bd588112f.exe

                              Filesize

                              4.3MB

                              MD5

                              ea9d4cdd2c3a08334a9bfca3cc42c9d3

                              SHA1

                              967238207fb0da446d69fb49c100bea5bb11c618

                              SHA256

                              09febedf5fe3b7498edd06359882ccb3b05d55a4e56cb6133960fe1723838845

                              SHA512

                              d415b953eaaa3b2a78405489fc025c59afd24117d8af7943fd0fb0903dcb460f200f6ff95a08d1224cf622f6f66105eae6336ef9bc263a6af312a4f1e781216d

                            • C:\Users\Admin\AppData\Local\Temp\1015803001\177b3acfa8.exe

                              Filesize

                              4.2MB

                              MD5

                              6a94a20c20e2a75fa16041e1175793e7

                              SHA1

                              40d8df3d0bdfef2eaccb7b14d62f78c9eff5c989

                              SHA256

                              102d2c6aa1e5b2a0d91df5f7dcdf0c8a0393595578ecb714669ef85e1319104d

                              SHA512

                              24250549fc70ffcbccb64eb5a1634005084bdfdccaeff892b6460ef10837d622bcbc817983c922516324b868c935f7d6277b8d919f2abeaf41b4156f948997c1

                            • C:\Users\Admin\AppData\Local\Temp\1015804001\be679e5602.exe

                              Filesize

                              384KB

                              MD5

                              dfd5f78a711fa92337010ecc028470b4

                              SHA1

                              1a389091178f2be8ce486cd860de16263f8e902e

                              SHA256

                              da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d

                              SHA512

                              a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656

                            • C:\Users\Admin\AppData\Local\Temp\1015805001\fc95371c79.exe

                              Filesize

                              1.7MB

                              MD5

                              6c1d0dabe1ec5e928f27b3223f25c26b

                              SHA1

                              e25ab704a6e9b3e4c30a6c1f7043598a13856ad9

                              SHA256

                              92228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d

                              SHA512

                              3a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9

                            • C:\Users\Admin\AppData\Local\Temp\1015806001\471d3aa0c9.exe

                              Filesize

                              1.8MB

                              MD5

                              1d13d83ba0b9e54307060da3ad2c16bf

                              SHA1

                              45fe957170c36b1704c25ff65d59dd8bbe6894cd

                              SHA256

                              cce6c6f51a01ff3662b263cd464e41b163db9590453603e2c8b5dee39d5f94d0

                              SHA512

                              803e1b9587fc7aab36c96d52fe901fa6dbe0523aa46da23afb0bd50f7ebcbe5bfd9793ac61cbdd4d228159786d240d5161ff80a5e445eaa00fc77cdf455eb526

                            • C:\Users\Admin\AppData\Local\Temp\1015807001\8f36e42557.exe

                              Filesize

                              1.7MB

                              MD5

                              228bc900c337f34da99576e917296e62

                              SHA1

                              0f6393c99373b170166bf3e563d3380914d8afe3

                              SHA256

                              9b4a6a847a0e8ea430a26136519ab7bf301f6b6c3a162d8443300d5e6f50cb86

                              SHA512

                              7c5a8bd94c9cca5267aafd0284573843e77d8cb9294131396a6b434af8d8e489ca33374d718fc45edb7e412c0f8d6832f8a936374a4f6612f2e9395377cd4382

                            • C:\Users\Admin\AppData\Local\Temp\1015808001\8f64538c39.exe

                              Filesize

                              947KB

                              MD5

                              57778e359f7a297ae6cdd2ed3f5c5948

                              SHA1

                              3b59ed3b0f897360417c4bfe968dbba1e6c6d131

                              SHA256

                              1f77138ef1f1af95b14a4a4fea1dea74b577cbe7a7f5a0b52ea961403a746bb6

                              SHA512

                              9005780888b1e50ab7219485d3f12a7f34130d42504cf8ea9b0b01be1f26e7e2a690e954f6103e8b3780385461bd4892f59bc21845c11d5c0d4fed7609081bf5

                            • C:\Users\Admin\AppData\Local\Temp\1015809001\d118853b9f.exe

                              Filesize

                              2.7MB

                              MD5

                              4a649d48686ec55e5db1885fff76599c

                              SHA1

                              3d41ed3d178781329c909aab9fcee08d0899a868

                              SHA256

                              e44f81677984953a1901f893625d034e8e8862de7ce9bf9a3f292a1b4a68ea47

                              SHA512

                              35c46315d91f0029d53b55df157cc01e36f150a297f64f735fdd2d9c9b9330e407ff8a2e4ce53f68403873915bbc2acef89456d1f20c3bdb28e2a8ff19f7b631

                            • C:\Users\Admin\AppData\Local\Temp\BT9KU4PWKDP3AMFR2PAT9K231W62.exe

                              Filesize

                              2.6MB

                              MD5

                              1e79d4fce2c654ed8d56747616ec0746

                              SHA1

                              73d8717f19ac08c494ef7a533dbdec599c9a644d

                              SHA256

                              29425b85ecbb9a2009dfe1f482d1a29d65d991eec1f69f7386c782bbc54980d0

                              SHA512

                              bc44178b2ae8f8d185f800bd05247080bbd9b7f4c7da587f0c9d2e205358d47e57cb5b4fc03b08f17115bf89fa33cbff5d137f8b82230d4d694f16016cec4ce5

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jfwgueho.e0v.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                              Filesize

                              3.0MB

                              MD5

                              ad7f121646aa374af133772519375710

                              SHA1

                              4e85ad004aa170ed53b7818b78e0b12e042b18ea

                              SHA256

                              d9865442479ec9a282ff312cd91481710f9b6e21330be30a68fa16bf36c0799f

                              SHA512

                              fbe1dfd40bc2fa8c6617823d32023dba5625c5e7cb235f87b284f1166a30d64e75781e80b2586e4a6f7ada4cda9df3e17f1d61829705647c71232a2f902c81c3

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                              Filesize

                              1.6MB

                              MD5

                              72491c7b87a7c2dd350b727444f13bb4

                              SHA1

                              1e9338d56db7ded386878eab7bb44b8934ab1bc7

                              SHA256

                              34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                              SHA512

                              583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                              Filesize

                              458KB

                              MD5

                              619f7135621b50fd1900ff24aade1524

                              SHA1

                              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                              SHA256

                              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                              SHA512

                              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                              Filesize

                              2.2MB

                              MD5

                              579a63bebccbacab8f14132f9fc31b89

                              SHA1

                              fca8a51077d352741a9c1ff8a493064ef5052f27

                              SHA256

                              0ac3504d5fa0460cae3c0fd9c4b628e1a65547a60563e6d1f006d17d5a6354b0

                              SHA512

                              4a58ca0f392187a483b9ef652b6e8b2e60d01daa5d331549df9f359d2c0a181e975cf9df79552e3474b9d77f8e37a1cf23725f32d4cdbe4885e257a7625f7b1f

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                              Filesize

                              1.7MB

                              MD5

                              5659eba6a774f9d5322f249ad989114a

                              SHA1

                              4bfb12aa98a1dc2206baa0ac611877b815810e4c

                              SHA256

                              e04346fee15c3f98387a3641e0bba2e555a5a9b0200e4b9256b1b77094069ae4

                              SHA512

                              f93abf2787b1e06ce999a0cbc67dc787b791a58f9ce20af5587b2060d663f26be9f648d116d9ca279af39299ea5d38e3c86271297e47c1438102ca28fce8edc4

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                              Filesize

                              1.7MB

                              MD5

                              5404286ec7853897b3ba00adf824d6c1

                              SHA1

                              39e543e08b34311b82f6e909e1e67e2f4afec551

                              SHA256

                              ec94a6666a3103ba6be60b92e843075a2d7fe7d30fa41099c3f3b1e2a5eba266

                              SHA512

                              c4b78298c42148d393feea6c3941c48def7c92ef0e6baac99144b083937d0a80d3c15bd9a0bf40daa60919968b120d62999fa61af320e507f7e99fbfe9b9ef30

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                              Filesize

                              1.7MB

                              MD5

                              5eb39ba3698c99891a6b6eb036cfb653

                              SHA1

                              d2f1cdd59669f006a2f1aa9214aeed48bc88c06e

                              SHA256

                              e77f5e03ae140dda27d73e1ffe43f7911e006a108cf51cbd0e05d73aa92da7c2

                              SHA512

                              6c4ca20e88d49256ed9cabec0d1f2b00dfcf3d1603b5c95d158d4438c9f1e58495f8dfa200dbe7f49b5b0dd57886517eb3b98c4190484548720dad4b3db6069e

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

                              Filesize

                              1.7MB

                              MD5

                              7187cc2643affab4ca29d92251c96dee

                              SHA1

                              ab0a4de90a14551834e12bb2c8c6b9ee517acaf4

                              SHA256

                              c7e92a1af295307fb92ad534e05fba879a7cf6716f93aefca0ebfcb8cee7a830

                              SHA512

                              27985d317a5c844871ffb2527d04aa50ef7442b2f00d69d5ab6bbb85cd7be1d7057ffd3151d0896f05603677c2f7361ed021eac921e012d74da049ef6949e3a3

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

                              Filesize

                              1.7MB

                              MD5

                              b7d1e04629bec112923446fda5391731

                              SHA1

                              814055286f963ddaa5bf3019821cb8a565b56cb8

                              SHA256

                              4da77d4ee30ad0cd56cd620f4e9dc4016244ace015c5b4b43f8f37dd8e3a8789

                              SHA512

                              79fc3606b0fe6a1e31a2ecacc96623caf236bf2be692dadab6ea8ffa4af4231d782094a63b76631068364ac9b6a872b02f1e080636eba40ed019c2949a8e28db

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

                              Filesize

                              1.7MB

                              MD5

                              0dc4014facf82aa027904c1be1d403c1

                              SHA1

                              5e6d6c020bfc2e6f24f3d237946b0103fe9b1831

                              SHA256

                              a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7

                              SHA512

                              cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_7.zip

                              Filesize

                              3.3MB

                              MD5

                              cea368fc334a9aec1ecff4b15612e5b0

                              SHA1

                              493d23f72731bb570d904014ffdacbba2334ce26

                              SHA256

                              07e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541

                              SHA512

                              bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748

                            • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                              Filesize

                              3.3MB

                              MD5

                              045b0a3d5be6f10ddf19ae6d92dfdd70

                              SHA1

                              0387715b6681d7097d372cd0005b664f76c933c7

                              SHA256

                              94b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d

                              SHA512

                              58255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b

                            • C:\Users\Admin\AppData\Local\Temp\main\in.exe

                              Filesize

                              1.7MB

                              MD5

                              83d75087c9bf6e4f07c36e550731ccde

                              SHA1

                              d5ff596961cce5f03f842cfd8f27dde6f124e3ae

                              SHA256

                              46db3164bebffc61c201fe1e086bffe129ddfed575e6d839ddb4f9622963fb3f

                              SHA512

                              044e1f5507e92715ce9df8bb802e83157237a2f96f39bac3b6a444175f1160c4d82f41a0bcecf5feaf1c919272ed7929baef929a8c3f07deecebc44b0435164a

                            • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                              Filesize

                              440B

                              MD5

                              3626532127e3066df98e34c3d56a1869

                              SHA1

                              5fa7102f02615afde4efd4ed091744e842c63f78

                              SHA256

                              2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                              SHA512

                              dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                              Filesize

                              6KB

                              MD5

                              331f48e047b8f7b5d834d5ca83490d7f

                              SHA1

                              f7dc06bb5c259a1398049f32007052ce75b8bf02

                              SHA256

                              3a24a4fc97946f4a21afe5ee744f6f1a79780f0b5e53de4e19027817c0905b6e

                              SHA512

                              0ac614cdd8b345b1e1e3fc9bc07e7121fcff1f0f5b6123896848a45e514242066b947b634f751f9d44edb61d40e883dcaec93d63129885dd12752518c76b59d8

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                              Filesize

                              8KB

                              MD5

                              287ddcf7135deb0764bc1d739663b120

                              SHA1

                              42d240c9b638d7381c5a7eb606af248bc9635574

                              SHA256

                              06a551f0c4594de6418632c3e0836ae5d53431320bed223ee9bd812a74636a9f

                              SHA512

                              7be7a176c754503478709ff48a59bf12e1a5d29e9fe2e586c4cc4f00da61497295def1bd059160469cf5b2f789ccf31eed9008de02aa0ebc628e69651b9fe8d7

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                              Filesize

                              13KB

                              MD5

                              5f81835a97ffd90d6afb1ffec1a49247

                              SHA1

                              960134b7c27f8d141231ce0f59ad1e6a7462d146

                              SHA256

                              9f8a90b3cad2382e2195bd407c0d25560e59e96dea3f57be3c14eeba91d3e02c

                              SHA512

                              d2d5c7f069f6ec61991256a84ff259b3837577d1fd663ab418d609db80474b8f48e41d02e82a309b335c14c7cafbefcb583a868bf6ac9aa07d0dd2349135812b

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              5ceaefc18cfc72d6a027df82e6b1df7c

                              SHA1

                              71a3acb126280843fc83690024cd19154bf68e95

                              SHA256

                              4634f91e6310a26588faeb6823e792c6411ac3a49ea92063e8338cc4e685df6f

                              SHA512

                              92a18f1976034bfa8ec6baaeeb9b323ef5dbe4e54db43d8f626c4f9898a57ffe99897948863160a4a6f1ea9a425ecbbff0ad617ba9d964fba61f52c7dcc63cc2

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              f2af9e1379b98cdc4cec3f218ddb8bf6

                              SHA1

                              5d5de1d8a4bbe07b5225afcef5ec7778bfba2797

                              SHA256

                              8da2d9ea377fc30bfef26fc2cf99b8b041883700e0a5e874c6f07cd943831991

                              SHA512

                              eb0ea99d3c078f1ad8df4345286f844abd044f2f2c812baf078d7e9a57236196b1813c6c4d4f997ea196eed4371487f924b0379f26b0c91c527da023db0b6eb1

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              0840ab7186cba0665fe2df1b80b7adcc

                              SHA1

                              c85c2318d9c58621c36a1699158d95032e2e9a05

                              SHA256

                              201f01753c3a3193d88969c939a1db969f083da33f774e403a63f9cbdc2ec6bb

                              SHA512

                              c7c89af39ea80ac9512c6ced9d9067ee39d39388468a1d4e31fb31eb4101f047d6bd5d09c27a3cd0d09880657f8ac8b69a20ec23e145bdb6e95d96d29bf7f8bb

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\9443e872-be78-4b9d-ad42-b8287e5808ba

                              Filesize

                              25KB

                              MD5

                              da1e7c3c95cd5535bf969fbd9abbe0dd

                              SHA1

                              0d8dc4324d7c4dd70361413413cd3dfda5bee0d0

                              SHA256

                              66fd254e09dc670877e2a63bcac9ac47a6c84d8ef4dfeac68affbb3650f12a61

                              SHA512

                              8b3431cdf497cf4902bd629cebd7670beca94fbed63e5446a03806a37694cb5c003c2fdc63a72bfad7e7d3c685c5423f304160b1fcb9fa53c0bc28bee779c6c9

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\a922bb49-ba18-48e5-bdca-536c54e75e28

                              Filesize

                              671B

                              MD5

                              213950c3f9d8a2a9350388fb3cf66350

                              SHA1

                              b6235fd64978b37ff2eb9a062921e41e52428181

                              SHA256

                              f23bb4410fa5e6530c88fb09a8a80afc3d4d9757187eca56c2d467fbfc8a75f7

                              SHA512

                              e98981f5237662cdc48386204815c204943a6a84a67dc9c37bcbb753cde7b98b53ada7eeb640a0df0851e7628929fa3c5ae867f659efc6753df6d83099651735

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\da7e2a93-f2ce-48e7-a81a-10eb6cdcfebb

                              Filesize

                              982B

                              MD5

                              aec0bd8700e2396cc58c9bf3220e1514

                              SHA1

                              25cbf7e6936dc6123dfccecb763b967e8cafc415

                              SHA256

                              c07caa7d11ca4ab8efb8e71f0856e0931da95a6e1acfd99a6d5fc971b05ea643

                              SHA512

                              ebf5432e062db6b4f78f065387e071a0fdeb476850f19213f5f10f0d5c38b67160ccc9dd541c171f19b5e52199d9917b059aa86a75304c2eb4195fc067ab7bcf

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                              Filesize

                              12KB

                              MD5

                              d524b38edfc6aea6e0b00431b2d2e219

                              SHA1

                              8caf60a0d6ecbfee5e9f2207fb40206c4680c94a

                              SHA256

                              a177c223954b88721b8f4cb62dc675e31616c6381473a5e08c6278d4016bb7ed

                              SHA512

                              1bb9ef83edab3c7a9edd5fabe72c81b4bfc89f1b1cb19c2bc6cd056fff72c320ff2dd0b26be5045694c9050a8a106de8281b83a3dc054c917e480cefc49e1768

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              ddaf9bc6b354677a592250706f5c02b0

                              SHA1

                              48e4a10672cb5f7ef38501eef35640befa3f29a3

                              SHA256

                              8e57506662f5888871079e922baec2e5cdc563c9695e024b470d3563f81a2168

                              SHA512

                              12a23e68a52f8d148862adfeb7ae3461caf33d1d3475eeeb06d4dc8005383944d5944d8fcc59445a76389ca4d31f7cb2c4a81bdb8d3aa4f25d4b83ee438badce

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              bee0149deca15b3052867a52b97c24fd

                              SHA1

                              fec206f3079750ac3c6edb70787b286251be20a1

                              SHA256

                              f713c529a1b5a5c8085dc850bd428d6a07421ff5f7c081db61217af68ad03182

                              SHA512

                              d63dd780c20a79d9c8d624d04b7c72329c5eb619805815b1d37fe690e91a302400e320272cb1ca729df6049c12490f561708d20330f6e47b0cafab84b0ddb292

                            • memory/216-50-0x0000000000DD1000-0x0000000000E39000-memory.dmp

                              Filesize

                              416KB

                            • memory/216-716-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-157-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-177-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-156-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-155-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-320-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-19-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-744-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-23-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-174-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-52-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-51-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-247-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-20-0x0000000000DD1000-0x0000000000E39000-memory.dmp

                              Filesize

                              416KB

                            • memory/216-21-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-215-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-22-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/216-26-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/224-147-0x00000255AAB10000-0x00000255AAB32000-memory.dmp

                              Filesize

                              136KB

                            • memory/1224-25-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1224-30-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1224-28-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1224-31-0x0000000000DD1000-0x0000000000E39000-memory.dmp

                              Filesize

                              416KB

                            • memory/1224-27-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1956-4-0x00000000006A0000-0x00000000009AE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1956-16-0x00000000006A1000-0x0000000000709000-memory.dmp

                              Filesize

                              416KB

                            • memory/1956-15-0x00000000006A0000-0x00000000009AE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1956-0-0x00000000006A0000-0x00000000009AE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1956-3-0x00000000006A0000-0x00000000009AE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/1956-2-0x00000000006A1000-0x0000000000709000-memory.dmp

                              Filesize

                              416KB

                            • memory/1956-1-0x00000000773F4000-0x00000000773F6000-memory.dmp

                              Filesize

                              8KB

                            • memory/2460-265-0x0000000000400000-0x000000000064B000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/2732-333-0x0000000000D50000-0x00000000011EB000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2732-283-0x0000000000D50000-0x00000000011EB000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/2924-150-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/2924-152-0x0000000000400000-0x0000000000457000-memory.dmp

                              Filesize

                              348KB

                            • memory/3264-192-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3264-190-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3264-188-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3264-193-0x0000000000780000-0x00000000007A0000-memory.dmp

                              Filesize

                              128KB

                            • memory/3264-194-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3264-220-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3264-182-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3264-184-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3264-185-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3264-186-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3264-187-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3264-189-0x0000000140000000-0x0000000140770000-memory.dmp

                              Filesize

                              7.4MB

                            • memory/3308-178-0x0000000000EF0000-0x0000000001AEC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/3308-176-0x0000000000EF0000-0x0000000001AEC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/3308-173-0x0000000000EF0000-0x0000000001AEC000-memory.dmp

                              Filesize

                              12.0MB

                            • memory/3456-264-0x0000000000C80000-0x000000000110B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/3456-285-0x0000000000C80000-0x000000000110B000-memory.dmp

                              Filesize

                              4.5MB

                            • memory/3992-337-0x00000000007C0000-0x0000000000E43000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/3992-335-0x00000000007C0000-0x0000000000E43000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4212-263-0x00000000008D0000-0x0000000001508000-memory.dmp

                              Filesize

                              12.2MB

                            • memory/4212-267-0x00000000008D0000-0x0000000001508000-memory.dmp

                              Filesize

                              12.2MB

                            • memory/4212-266-0x00000000008D0000-0x0000000001508000-memory.dmp

                              Filesize

                              12.2MB

                            • memory/4212-224-0x00000000008D0000-0x0000000001508000-memory.dmp

                              Filesize

                              12.2MB

                            • memory/4436-136-0x00007FF7F9CF0000-0x00007FF7FA180000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/4536-734-0x00000000009D0000-0x0000000000C90000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/4536-366-0x00000000009D0000-0x0000000000C90000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/4536-367-0x00000000009D0000-0x0000000000C90000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/4536-360-0x00000000009D0000-0x0000000000C90000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/4536-737-0x00000000009D0000-0x0000000000C90000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/4656-732-0x0000000000770000-0x0000000000A1C000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4656-717-0x0000000000770000-0x0000000000A1C000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4656-328-0x0000000000770000-0x0000000000A1C000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4656-327-0x0000000000770000-0x0000000000A1C000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4656-325-0x0000000000770000-0x0000000000A1C000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/4900-180-0x0000000000DD0000-0x00000000010DE000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/4968-302-0x0000000000B10000-0x0000000001193000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4968-301-0x0000000000B10000-0x0000000001193000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5084-183-0x00007FF6CC850000-0x00007FF6CCCE0000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/5084-195-0x00007FF6CC850000-0x00007FF6CCCE0000-memory.dmp

                              Filesize

                              4.6MB